Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-895x-rfqp-jh5c | Keycloak does not invalidate offline sessions when the offline_access scope is removed |
Solution
No solution given by the vendor.
Workaround
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
Fri, 24 Oct 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 23 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Oct 2025 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in Keycloak. An offline session continues to be valid when the offline_access scope is removed from the client. The refresh token is accepted and you can continue to request new tokens for the session. As it can lead to a situation where an administrator removes the scope, and assumes that offline sessions are no longer available, but they are. | |
| Title | Keycloak: org.keycloak:keycloak-services: user can refresh offline session even after client's offline_access scope was removed | |
| First Time appeared |
Redhat
Redhat build Keycloak |
|
| Weaknesses | CWE-613 | |
| CPEs | cpe:/a:redhat:build_keycloak: | |
| Vendors & Products |
Redhat
Redhat build Keycloak |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-10-23T14:28:01.047Z
Reserved: 2025-10-23T14:07:56.849Z
Link: CVE-2025-12110
Updated: 2025-10-23T14:27:27.452Z
Status : Received
Published: 2025-10-23T15:15:32.890
Modified: 2025-10-23T15:15:32.890
Link: CVE-2025-12110
OpenCVE Enrichment
No data.
Github GHSA