Duplicate Advisory: Keycloak allows Binding to an Unrestricted IP Address
Moderate severity
GitHub Reviewed
Published
Nov 13, 2025
to the GitHub Advisory Database
•
Updated Dec 2, 2025
Withdrawn
This advisory was withdrawn on Dec 2, 2025
Package
Affected versions
<= 26.4.4
Patched versions
None
Description
Published by the National Vulnerability Database
Nov 13, 2025
Published to the GitHub Advisory Database
Nov 13, 2025
Reviewed
Nov 13, 2025
Withdrawn
Dec 2, 2025
Last updated
Dec 2, 2025
Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-j4vq-q93m-4683. This link is maintained to preserve external references.
Original Description
A vulnerability exists in Keycloak's server distribution where enabling debug mode (--debug ) insecurely defaults to binding the Java Debug Wire Protocol (JDWP) port to all network interfaces (0.0.0.0). This exposes the debug port to the local network, allowing an attacker on the same network segment to attach a remote debugger and achieve remote code execution within the Keycloak Java virtual machine.
References