A flaw was found in Keycloak. An offline session continues to be valid when the offline_access scope is removed from the client. The refresh token is accepted and you can continue to request new tokens for the session. As it can lead to a situation where an administrator removes the scope, and assumes that offline sessions are no longer available, but they are.
Advisories
Source ID Title
Github GHSA Github GHSA GHSA-895x-rfqp-jh5c Keycloak does not invalidate offline sessions when the offline_access scope is removed
Fixes

Solution

No solution given by the vendor.


Workaround

Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.

History

Fri, 24 Oct 2025 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Thu, 23 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Oct 2025 14:30:00 +0000

Type Values Removed Values Added
Description A flaw was found in Keycloak. An offline session continues to be valid when the offline_access scope is removed from the client. The refresh token is accepted and you can continue to request new tokens for the session. As it can lead to a situation where an administrator removes the scope, and assumes that offline sessions are no longer available, but they are.
Title Keycloak: org.keycloak:keycloak-services: user can refresh offline session even after client's offline_access scope was removed
First Time appeared Redhat
Redhat build Keycloak
Weaknesses CWE-613
CPEs cpe:/a:redhat:build_keycloak:
Vendors & Products Redhat
Redhat build Keycloak
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2025-10-23T14:28:01.047Z

Reserved: 2025-10-23T14:07:56.849Z

Link: CVE-2025-12110

cve-icon Vulnrichment

Updated: 2025-10-23T14:27:27.452Z

cve-icon NVD

Status : Received

Published: 2025-10-23T15:15:32.890

Modified: 2025-10-23T15:15:32.890

Link: CVE-2025-12110

cve-icon Redhat

Severity : Moderate

Publid Date: 2025-10-23T00:00:00Z

Links: CVE-2025-12110 - Bugzilla

cve-icon OpenCVE Enrichment

No data.