Home

Description

A flaw was found in Keycloak. An offline session continues to be valid when the offline_access scope is removed from the client. The refresh token is accepted and you can continue to request new tokens for the session. As it can lead to a situation where an administrator removes the scope, and assumes that offline sessions are no longer available, but they are.

PUBLISHED Reserved 2025-10-23 | Published 2025-10-23 | Updated 2025-12-03 | Assigner redhat




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Problem types

Insufficient Session Expiration

Product status

Default status
affected

26.2.11-1 (rpm) before *
unaffected

Default status
affected

26.2-12 (rpm) before *
unaffected

Default status
affected

26.2-12 (rpm) before *
unaffected

Default status
unaffected

Default status
affected

26.4.4-1 (rpm) before *
unaffected

Default status
affected

26.4-3 (rpm) before *
unaffected

Default status
affected

26.4-3 (rpm) before *
unaffected

Default status
unaffected

Timeline

2025-10-23:Reported to Red Hat.
2025-10-23:Made public.

References

access.redhat.com/errata/RHSA-2025:21370 (RHSA-2025:21370) vendor-advisory

access.redhat.com/errata/RHSA-2025:21371 (RHSA-2025:21371) vendor-advisory

access.redhat.com/errata/RHSA-2025:22088 (RHSA-2025:22088) vendor-advisory

access.redhat.com/errata/RHSA-2025:22089 (RHSA-2025:22089) vendor-advisory

access.redhat.com/security/cve/CVE-2025-12110 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2406033 (RHBZ#2406033) issue-tracking

cve.org (CVE-2025-12110)

nvd.nist.gov (CVE-2025-12110)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.