CVE-2025-12110

A flaw was found in Keycloak. An offline session continues to be valid when the offline_access scope is removed from the client. The refresh token is accepted and you can continue to request new tokens for the session. As it can lead to a situation where an administrator removes the scope, and assumes that offline sessions are no longer available, but they are.
Configurations

No configuration.

History

28 Nov 2025, 04:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:22088 -
  • () https://access.redhat.com/errata/RHSA-2025:22089 -

13 Nov 2025, 23:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:21370 -
  • () https://access.redhat.com/errata/RHSA-2025:21371 -

Information

Published : 2025-10-23 15:15

Updated : 2025-11-28 04:15


NVD link : CVE-2025-12110

Mitre link : CVE-2025-12110

CVE.ORG link : CVE-2025-12110


JSON object : View

Products Affected

No product.

CWE
CWE-613

Insufficient Session Expiration