Home

Description

A flaw was found in Keycloak. Keycloak does not immediately enforce the disabling of the "Remember Me" realm setting on existing user sessions. Sessions created while "Remember Me" was active retain their extended session lifetime until they expire, overriding the administrator's recent security configuration change. This is a logic flaw in session management increases the potential window for successful session hijacking or unauthorized long-term access persistence. The flaw lies in the session expiration logic relying on the session-local "remember-me" flag without validating the current realm-level configuration.

PUBLISHED Reserved 2025-10-07 | Published 2025-10-23 | Updated 2025-10-23 | Assigner redhat




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Problem types

Insufficient Session Expiration

Product status

Default status
affected

Timeline

2025-10-07:Reported to Red Hat.
2025-10-07:Made public.

Credits

This issue was discovered by Alexander Schwartz (Red Hat).

References

access.redhat.com/security/cve/CVE-2025-11429 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2402148 (RHBZ#2402148) issue-tracking

cve.org (CVE-2025-11429)

nvd.nist.gov (CVE-2025-11429)

Download JSON