Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11429: Insufficient Session Expiration in Red Hat Red Hat build of Keycloak 26.2

0
Medium
VulnerabilityCVE-2025-11429cvecve-2025-11429
Published: Thu Oct 23 2025 (10/23/2025, 14:09:31 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat build of Keycloak 26.2

Description

A flaw was found in Keycloak. Keycloak does not immediately enforce the disabling of the "Remember Me" realm setting on existing user sessions. Sessions created while "Remember Me" was active retain their extended session lifetime until they expire, overriding the administrator's recent security configuration change. This is a logic flaw in session management increases the potential window for successful session hijacking or unauthorized long-term access persistence. The flaw lies in the session expiration logic relying on the session-local "remember-me" flag without validating the current realm-level configuration.

AI-Powered Analysis

AILast updated: 12/05/2025, 04:11:44 UTC

Technical Analysis

CVE-2025-11429 is a session management vulnerability identified in Red Hat's build of Keycloak version 26.2. The issue arises from a logic flaw where the system fails to immediately enforce the disabling of the 'Remember Me' feature at the realm level on existing user sessions. Specifically, sessions that were initiated while the 'Remember Me' option was active retain their extended session lifetime until they naturally expire, even after an administrator disables this setting. This occurs because the session expiration logic relies solely on a session-local 'remember-me' flag without revalidating the current realm-level configuration. Consequently, this flaw extends the window during which an attacker could hijack a session or maintain unauthorized persistent access, as sessions remain valid longer than intended. The vulnerability has a CVSS 3.1 base score of 5.4, indicating medium severity, with an attack vector of network, low attack complexity, requiring privileges but no user interaction, and impacts on confidentiality and integrity but not availability. No known exploits have been reported in the wild, and no patches or mitigations are explicitly linked in the provided data, suggesting the need for administrators to monitor updates closely. This vulnerability highlights the importance of robust session management and immediate enforcement of security configuration changes in identity and access management systems like Keycloak.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized prolonged access to sensitive systems and data managed via Keycloak, a widely used open-source identity and access management solution. The extended session lifetime increases the risk of session hijacking attacks, potentially allowing attackers to impersonate legitimate users for longer periods, compromising confidentiality and integrity of user data and organizational resources. This is particularly critical for sectors with stringent data protection requirements such as finance, healthcare, and government. The flaw may undermine recent security policy changes intended to reduce session duration, thereby weakening overall security posture. While availability is not directly impacted, the breach of confidentiality and integrity could lead to regulatory penalties under GDPR and damage to organizational reputation. The medium severity rating reflects a moderate but significant risk that requires timely attention to prevent exploitation.

Mitigation Recommendations

Organizations should immediately audit their Keycloak session management configurations and identify active sessions created under the 'Remember Me' setting. Since existing sessions retain extended lifetimes, administrators should consider forcibly terminating all active sessions or implementing a manual session invalidation process to enforce the updated realm-level settings. Monitoring and logging of session activity should be enhanced to detect unusual session durations or access patterns. Applying any forthcoming patches from Red Hat promptly is critical once available. Additionally, organizations can implement compensating controls such as multi-factor authentication (MFA) to reduce the risk of session hijacking and enforce stricter network segmentation to limit exposure. Reviewing and tightening privilege assignments to reduce the number of users who can modify session settings will also help mitigate risk. Finally, educating users about session security and encouraging regular logout practices can reduce the window of opportunity for attackers.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-10-07T12:45:40.121Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fa382cf7adcc2ea5025029

Added to database: 10/23/2025, 2:14:04 PM

Last enriched: 12/5/2025, 4:11:44 AM

Last updated: 12/6/2025, 8:12:33 PM

Views: 232

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats