CVE-2025-14778: Keycloak Affected by Broken Access Control Vulnerability in the UserManagedPermissionService
(updated )
A flaw was found in Keycloak. A significant Broken Access Control vulnerability exists in the UserManagedPermissionService (UMA Protection API). When updating or deleting a UMA policy associated with multiple resources, the authorization check only verifies the caller’s ownership against the first resource in the policy’s list. This allows a user (Owner A) who owns one resource (RA) to update a shared policy and modify authorization rules for other resources (e.g., RB) in that same policy, even if those other resources are owned by a different user (Owner B). This constitutes a horizontal privilege escalation.
References
- access.redhat.com/errata/RHSA-2026:2363
- access.redhat.com/errata/RHSA-2026:2364
- access.redhat.com/errata/RHSA-2026:2365
- access.redhat.com/errata/RHSA-2026:2366
- access.redhat.com/security/cve/CVE-2025-14778
- bugzilla.redhat.com/show_bug.cgi?id=2422600
- github.com/advisories/GHSA-fm6w-rrp3-2x4w
- github.com/keycloak/keycloak
- github.com/keycloak/keycloak/issues/46147
- github.com/keycloak/keycloak/pull/46154
- nvd.nist.gov/vuln/detail/CVE-2025-14778
Code Behaviors & Features
Detect and mitigate CVE-2025-14778 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →