CVE Vulnerabilities

CVE-2025-12390

Session Fixation

Published: Oct 28, 2025 | Modified: Dec 19, 2025
CVSS 3.x
N/A
Source:
NVD
CVSS 2.x
RedHat/V2
RedHat/V3
6 MODERATE
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
Ubuntu
root.io logo minimus.io logo echo.ai logo

A flaw was found in Keycloak. In Keycloak where a user can accidentally get access to another users session if both use the same device and browser. This happens because Keycloak sometimes reuses session identifiers and doesn’t clean up properly during logout when browser cookies are missing. As a result, one user may receive tokens that belong to another user.

Weakness

Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.

Affected Software

NameVendorStart VersionEnd Version
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-operator-bundle:26.2.11-1*
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-rhel9:26.2-12*
Red Hat build of Keycloak 26.2RedHatrhbk/keycloak-rhel9-operator:26.2-12*
Red Hat build of Keycloak 26.2.11RedHat*
Red Hat build of Keycloak 26.4RedHatrhbk/keycloak-operator-bundle:26.4.4-1*
Red Hat build of Keycloak 26.4RedHatrhbk/keycloak-rhel9:26.4-3*
Red Hat build of Keycloak 26.4RedHatrhbk/keycloak-rhel9-operator:26.4-3*
Red Hat build of Keycloak 26.4.4RedHatkeycloak*

Extended Description

Such a scenario is commonly observed when:

In the generic exploit of session fixation vulnerabilities, an attacker creates a new session on a web application and records the associated session identifier. The attacker then causes the victim to associate, and possibly authenticate, against the server using that session identifier, giving the attacker access to the user’s account through the active session.

Potential Mitigations

References