Description
A flaw was found in Keycloak. An offline session continues to be valid when the offline_access scope is removed from the client. The refresh token is accepted and you can continue to request new tokens for the session. As it can lead to a situation where an administrator removes the scope, and assumes that offline sessions are no longer available, but they are.
Problem types
Insufficient Session Expiration
Product status
26.2.11-1 (rpm) before *
26.2-12 (rpm) before *
26.2-12 (rpm) before *
26.4.4-1 (rpm) before *
26.4-3 (rpm) before *
26.4-3 (rpm) before *
Timeline
| 2025-10-23: | Reported to Red Hat. |
| 2025-10-23: | Made public. |
References
access.redhat.com/errata/RHSA-2025:21370 (RHSA-2025:21370)
access.redhat.com/errata/RHSA-2025:21371 (RHSA-2025:21371)
access.redhat.com/errata/RHSA-2025:22088 (RHSA-2025:22088)
access.redhat.com/errata/RHSA-2025:22089 (RHSA-2025:22089)
access.redhat.com/security/cve/CVE-2025-12110
bugzilla.redhat.com/show_bug.cgi?id=2406033 (RHBZ#2406033)
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.