A flaw was found in Keycloak that occurs from an error in the re-authentication mechanism within org.keycloak.authentication. This flaw allows hijacking an active Keycloak session by triggering a new authentication process with the query parameter "prompt=login," prompting the user to re-enter their credentials. If the user cancels this re-authentication by selecting "Restart login," an account takeover may occur, as the new session, with a different SUB, will possess the same SID as the previous session.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1185 | A flaw was found in Keycloak that occurs from an error in the re-authentication mechanism within org.keycloak.authentication. This flaw allows hijacking an active Keycloak session by triggering a new authentication process with the query parameter "prompt=login," prompting the user to re-enter their credentials. If the user cancels this re-authentication by selecting "Restart login," an account takeover may occur, as the new session, with a different SUB, will possess the same SID as the previous session. |
Github GHSA |
GHSA-c9h6-v78w-52wj | Keycloak vulnerable to session hijacking via re-authentication |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 30 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat build Of Keycloak
Redhat keycloak |
|
| CPEs | cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:text-only:*:*:* cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Redhat build Of Keycloak
Redhat keycloak |
Fri, 14 Mar 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 13 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-11T15:57:32.291Z
Reserved: 2023-12-13T16:22:00.344Z
Link: CVE-2023-6787
Updated: 2024-08-02T08:42:07.631Z
Status : Analyzed
Published: 2024-04-25T16:15:10.867
Modified: 2025-06-30T13:49:15.333
Link: CVE-2023-6787
OpenCVE Enrichment
No data.
EUVD
Github GHSA