We found results for “”
CVE-2025-12110
Good to know:
Date: October 23, 2025
A flaw was found in Keycloak. An offline session continues to be valid when the offline_access scope is removed from the client. The refresh token is accepted and you can continue to request new tokens for the session. As it can lead to a situation where an administrator removes the scope, and assumes that offline sessions are no longer available, but they are.
Severity Score
Related Resources (10)
Severity Score
Weakness Type (CWE)
Insufficient Session Expiration
CWE-613Top Fix
Upgrade Version
Upgrade to version org.keycloak:keycloak-services:26.3.0;https://github.com/keycloak/keycloak.git - 26.3.0
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | UNCHANGED |
| Confidentiality (C): | LOW |
| Integrity (I): | LOW |
| Availability (A): | NONE |
Vulnerabilities
Projects
Contact Us


