Home

Description

A flaw was found in Keycloak. An offline session continues to be valid when the offline_access scope is removed from the client. The refresh token is accepted and you can continue to request new tokens for the session. As it can lead to a situation where an administrator removes the scope, and assumes that offline sessions are no longer available, but they are.

PUBLISHED Reserved 2025-10-23 | Published 2025-10-23 | Updated 2025-10-23 | Assigner redhat




MEDIUM: 5.4CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Problem types

Insufficient Session Expiration

Product status

Default status
affected

Timeline

2025-10-23:Reported to Red Hat.
2025-10-23:Made public.

References

access.redhat.com/security/cve/CVE-2025-12110 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2406033 (RHBZ#2406033) issue-tracking

cve.org (CVE-2025-12110)

nvd.nist.gov (CVE-2025-12110)

Download JSON