Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12110: Insufficient Session Expiration in Red Hat Red Hat build of Keycloak 26.2

0
Medium
VulnerabilityCVE-2025-12110cvecve-2025-12110
Published: Thu Oct 23 2025 (10/23/2025, 14:19:24 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat build of Keycloak 26.2

Description

A flaw was found in Keycloak. An offline session continues to be valid when the offline_access scope is removed from the client. The refresh token is accepted and you can continue to request new tokens for the session. As it can lead to a situation where an administrator removes the scope, and assumes that offline sessions are no longer available, but they are.

AI-Powered Analysis

AILast updated: 12/05/2025, 04:11:55 UTC

Technical Analysis

CVE-2025-12110 is a vulnerability identified in the Red Hat build of Keycloak version 26.2, related to insufficient session expiration controls. Keycloak is an open-source identity and access management solution widely used for single sign-on and token-based authentication. The vulnerability arises because offline sessions remain valid even after the offline_access scope is removed from the client configuration. Normally, removing this scope should invalidate offline sessions and prevent refresh tokens from being accepted. However, due to this flaw, refresh tokens continue to be accepted, allowing an attacker or unauthorized user to request new access tokens indefinitely for the same session. This undermines the administrator's intent to revoke offline access, potentially leading to prolonged unauthorized access to protected resources. The CVSS score of 5.4 (medium severity) reflects that the vulnerability requires network access and low privileges but no user interaction, and impacts confidentiality and integrity without affecting availability. There are no known exploits in the wild yet, and no patches were linked at the time of publication, indicating that organizations must be vigilant and proactive. The flaw could be exploited by an attacker who has obtained a refresh token prior to scope removal, allowing continued token refresh and access beyond the intended session lifetime. This vulnerability highlights the importance of robust session and token lifecycle management in identity platforms.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality and integrity of sensitive data and systems protected by Keycloak authentication. Attackers or malicious insiders with access to refresh tokens could maintain unauthorized access even after administrators attempt to revoke offline access, potentially leading to data breaches, privilege escalation, or lateral movement within networks. Organizations relying on Keycloak for critical applications, especially those handling personal data under GDPR, face compliance risks if unauthorized access persists undetected. The medium severity score indicates a moderate risk, but the potential for prolonged unauthorized access without user interaction increases the threat level in environments with high-value targets. The impact is particularly significant for sectors such as finance, healthcare, government, and telecommunications, where identity management is crucial. Additionally, the lack of immediate patches means organizations must implement compensating controls to mitigate risk until updates are available.

Mitigation Recommendations

1. Monitor and audit refresh token usage closely to detect unusual or prolonged token refresh activity that may indicate exploitation. 2. Implement strict token revocation policies and consider reducing refresh token lifetimes to limit exposure. 3. Enforce multi-factor authentication (MFA) to reduce the risk of token theft or misuse. 4. Segregate administrative functions and restrict privileges to minimize the impact of compromised tokens. 5. Stay informed on Red Hat and Keycloak vendor advisories and apply patches promptly once released. 6. Consider deploying additional session management controls such as token introspection and real-time revocation checks. 7. Educate administrators on the implications of offline_access scope changes and verify session invalidation through testing. 8. Use network segmentation and anomaly detection systems to identify suspicious authentication patterns. 9. Review and update incident response plans to include scenarios involving token misuse and session persistence. 10. If possible, temporarily disable offline_access scope or limit its use until the vulnerability is addressed.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-10-23T14:07:56.849Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fa3b37958c70c10281cfae

Added to database: 10/23/2025, 2:27:03 PM

Last enriched: 12/5/2025, 4:11:55 AM

Last updated: 12/7/2025, 3:43:25 AM

Views: 410

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats