CVE-2025-12110

A flaw was found in Keycloak. An offline session continues to be valid when the offline_access scope is removed from the client. The refresh token is accepted and you can continue to request new tokens for the session. As it can lead to a situation where an administrator removes the scope, and assumes that offline sessions are no longer available, but they are.
Configurations

No configuration.

History

19 Dec 2025, 22:15

Type Values Removed Values Added
References
  • () https://github.com/keycloak/keycloak/pull/43790 -

28 Nov 2025, 04:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:22088 -
  • () https://access.redhat.com/errata/RHSA-2025:22089 -

13 Nov 2025, 23:15

Type Values Removed Values Added
References
  • () https://access.redhat.com/errata/RHSA-2025:21370 -
  • () https://access.redhat.com/errata/RHSA-2025:21371 -

23 Oct 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-23 15:15

Updated : 2025-12-19 22:15


NVD link : CVE-2025-12110

Mitre link : CVE-2025-12110

CVE.ORG link : CVE-2025-12110


JSON object : View

Products Affected

No product.

CWE
CWE-613

Insufficient Session Expiration