{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-29T19:53:29.651","vulnerabilities":[{"cve":{"id":"CVE-2025-14778","sourceIdentifier":"secalert@redhat.com","published":"2026-02-09T20:15:54.470","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A flaw was found in Keycloak. A significant Broken Access Control vulnerability exists in the UserManagedPermissionService (UMA Protection API). When updating or deleting a UMA policy associated with multiple resources, the authorization check only verifies the caller's ownership against the first resource in the policy's list. This allows a user (Owner A) who owns one resource (RA) to update a shared policy and modify authorization rules for other resources (e.g., RB) in that same policy, even if those other resources are owned by a different user (Owner B). This constitutes a horizontal privilege escalation."},{"lang":"es","value":"Se encontró una falla en Keycloak. Existe una significativa vulnerabilidad de control de acceso roto en el UserManagedPermissionService (API de Protección UMA). Al actualizar o eliminar una política UMA asociada con múltiples recursos, la verificación de autorización solo verifica la propiedad del llamador contra el primer recurso en la lista de la política. Esto permite a un usuario (Propietario A) que posee un recurso (RA) actualizar una política compartida y modificar reglas de autorización para otros recursos (p. ej., RB) en esa misma política, incluso si esos otros recursos son propiedad de un usuario diferente (Propietario B). Esto constituye una escalada de privilegios horizontal."}],"metrics":{"cvssMetricV31":[{"source":"secalert@redhat.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}]},"weaknesses":[{"source":"secalert@redhat.com","type":"Secondary","description":[{"lang":"en","value":"CWE-266"}]}],"references":[{"url":"https://access.redhat.com/errata/RHSA-2026:2363","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2026:2364","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2026:2365","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/errata/RHSA-2026:2366","source":"secalert@redhat.com"},{"url":"https://access.redhat.com/security/cve/CVE-2025-14778","source":"secalert@redhat.com"},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2422600","source":"secalert@redhat.com"}]}}]}