CVE Vulnerabilities

CVE-2025-12110

Insufficient Session Expiration

Published: Oct 23, 2025 | Modified: Dec 19, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
5.4 MODERATE
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Ubuntu
root.io logo minimus.io logo echo.ai logo

A flaw was found in Keycloak. An offline session continues to be valid when the offline_access scope is removed from the client. The refresh token is accepted and you can continue to request new tokens for the session. As it can lead to a situation where an administrator removes the scope, and assumes that offline sessions are no longer available, but they are.

Weakness

According to WASC, “Insufficient Session Expiration is when a web site permits an attacker to reuse old session credentials or session IDs for authorization.”

Affected Software

NameVendorStart VersionEnd Version
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-operator-bundle:26.2.11-1*
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-rhel9:26.2-12*
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-rhel9-operator:26.2-12*
Red Hat build of Keycloak 26.2.11RedHat*
Red Hat build of Keycloak 26.4RedHatrhbk/keycloak-operator-bundle:26.4.4-1*
Red Hat build of Keycloak 26.4RedHatrhbk/keycloak-rhel9:26.4-3*
Red Hat build of Keycloak 26.4RedHatrhbk/keycloak-rhel9-operator:26.4-3*
Red Hat build of Keycloak 26.4.4RedHatkeycloak-server*

Potential Mitigations

References