Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12390: Session Fixation in Red Hat Red Hat build of Keycloak 26.2

0
Medium
VulnerabilityCVE-2025-12390cvecve-2025-12390
Published: Tue Oct 28 2025 (10/28/2025, 13:23:34 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat build of Keycloak 26.2

Description

A flaw was found in Keycloak. In Keycloak where a user can accidentally get access to another user's session if both use the same device and browser. This happens because Keycloak sometimes reuses session identifiers and doesn’t clean up properly during logout when browser cookies are missing. As a result, one user may receive tokens that belong to another user.

AI-Powered Analysis

AILast updated: 12/05/2025, 04:17:54 UTC

Technical Analysis

CVE-2025-12390 identifies a session fixation vulnerability in the Red Hat build of Keycloak version 26.2. The issue arises because Keycloak sometimes reuses session identifiers and fails to properly clean up session data during logout when browser cookies are missing. This flaw allows a scenario where two users sharing the same device and browser environment can have their sessions interchanged, leading to one user inadvertently gaining access to another user's session tokens. The root cause is improper session invalidation and reuse of session IDs, which violates secure session management principles. Exploitation requires that both users use the same device/browser, and that cookies are missing or deleted, which is a relatively uncommon but plausible scenario in shared or public workstation environments. The vulnerability impacts confidentiality and integrity by exposing sensitive authentication tokens and potentially allowing unauthorized access to user accounts. The CVSS 3.1 vector (AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N) indicates that the attack requires local access, high attack complexity, low privileges, and user interaction, with no impact on availability. No public exploits have been reported yet, but the vulnerability is published and should be addressed promptly. The flaw is specific to Red Hat's build of Keycloak 26.2, a widely used open-source identity and access management solution, often deployed in enterprise environments for authentication and authorization services.

Potential Impact

For European organizations, the vulnerability poses a risk primarily to confidentiality and integrity of user sessions, potentially leading to unauthorized access to sensitive applications and data. Organizations that deploy Keycloak 26.2 in environments where devices are shared among multiple users—such as call centers, public kiosks, or shared office workstations—are at higher risk. Attackers with local access could exploit this flaw to hijack sessions, leading to data breaches, privilege escalation, and unauthorized actions within protected systems. The impact is mitigated by the requirement for local access and user interaction, but the risk remains significant in environments with shared devices or insufficient endpoint security. Additionally, sectors with strict compliance requirements (e.g., finance, healthcare, government) may face regulatory consequences if session hijacking leads to data exposure. The lack of availability impact means service disruption is unlikely, but trust and security posture could be compromised.

Mitigation Recommendations

Organizations should immediately upgrade to a patched version of Red Hat Keycloak once available. In the interim, administrators should enforce strict session management policies, including ensuring that session identifiers are unique per login and properly invalidated on logout. Implementing browser cookie management policies to prevent cookie deletion or manipulation can reduce risk. Deploy endpoint security controls to restrict unauthorized local access and monitor for unusual session activity. Consider configuring Keycloak to enforce multi-factor authentication (MFA) to reduce the impact of session hijacking. Educate users about the risks of shared device usage and encourage logging out properly and avoiding shared browsers. Network segmentation and access controls can limit exposure of Keycloak instances to trusted users only. Regularly audit session logs for anomalies and integrate with SIEM solutions for real-time alerting on suspicious session behavior.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
redhat
Date Reserved
2025-10-28T13:14:38.975Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6900c82a05cd0025c8e834e4

Added to database: 10/28/2025, 1:42:02 PM

Last enriched: 12/5/2025, 4:17:54 AM

Last updated: 12/13/2025, 3:43:59 AM

Views: 279

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats