CVE Vulnerabilities

CVE-2025-12110

Insufficient Session Expiration

Published: Oct 23, 2025 | Modified: Nov 13, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
5.4 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Ubuntu

A flaw was found in Keycloak. An offline session continues to be valid when the offline_access scope is removed from the client. The refresh token is accepted and you can continue to request new tokens for the session. As it can lead to a situation where an administrator removes the scope, and assumes that offline sessions are no longer available, but they are.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

Name Vendor Start Version End Version
Red Hat build of Keycloak 26.4 RedHat rhbk/keycloak-operator-bundle:26.4.4-1 *
Red Hat build of Keycloak 26.4 RedHat rhbk/keycloak-rhel9:26.4-3 *
Red Hat build of Keycloak 26.4 RedHat rhbk/keycloak-rhel9-operator:26.4-3 *
Red Hat build of Keycloak 26.4.4 RedHat keycloak-server *

Potential Mitigations

References