Логотип exploitDog
bind:CVE-2025-10043
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-10043

Количество 3

Количество 3

redhat логотип

CVE-2025-10043

4 месяца назад

A path traversal validation flaw exists in Keycloak’s vault key handling on Windows. The previous fix for CVE-2024-10492 did not account for the Windows file separator (\). As a result, a high-privilege administrator could probe for the existence of files outside the expected realm context through crafted vault secret lookups. This is a platform-specific variant/incomplete fix of CVE-2024-10492.

CVSS3: 2.7
EPSS: Низкий
nvd логотип

CVE-2025-10043

4 месяца назад

Rejected reason: Considered by the maintainers a bug scenario experienced rather than a vulnerability.

EPSS: Низкий
github логотип

GHSA-wc64-wmfm-46vw

4 месяца назад

A path traversal validation flaw exists in Keycloak’s vault key handling on Windows. The previous fix for CVE-2024-10492 did not account for the Windows file separator (\). As a result, a high-privilege administrator could probe for the existence of files outside the expected realm context through crafted vault secret lookups. This is a platform-specific variant/incomplete fix of CVE-2024-10492.

CVSS3: 2.7
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
redhat логотип
CVE-2025-10043

A path traversal validation flaw exists in Keycloak’s vault key handling on Windows. The previous fix for CVE-2024-10492 did not account for the Windows file separator (\). As a result, a high-privilege administrator could probe for the existence of files outside the expected realm context through crafted vault secret lookups. This is a platform-specific variant/incomplete fix of CVE-2024-10492.

CVSS3: 2.7
4 месяца назад
nvd логотип
CVE-2025-10043

Rejected reason: Considered by the maintainers a bug scenario experienced rather than a vulnerability.

4 месяца назад
github логотип
GHSA-wc64-wmfm-46vw

A path traversal validation flaw exists in Keycloak’s vault key handling on Windows. The previous fix for CVE-2024-10492 did not account for the Windows file separator (\). As a result, a high-privilege administrator could probe for the existence of files outside the expected realm context through crafted vault secret lookups. This is a platform-specific variant/incomplete fix of CVE-2024-10492.

CVSS3: 2.7
4 месяца назад

Уязвимостей на страницу