6

CVE-2025-12390

Org.keycloak.protocol.oidc.endpoints.logoutendpoint: offline session takeover due to reused authentication session id

A flaw was found in Keycloak. In Keycloak where a user can accidentally get access to another user's session if both use the same device and browser. This happens because Keycloak sometimes reuses session identifiers and doesn’t clean up properly during logout when browser cookies are missing. As a result, one user may receive tokens that belong to another user.
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerKeycloak
Produkt keycloak
Default Statusunaffected
Version 0
Version < 26.0.0
Status affected
HerstellerRed Hat
Produkt Red Hat build of Keycloak 26.2
Default Statusaffected
Version 26.2.11-1
Version < *
Status unaffected
HerstellerRed Hat
Produkt Red Hat build of Keycloak 26.2
Default Statusaffected
Version 26.2-12
Version < *
Status unaffected
HerstellerRed Hat
Produkt Red Hat build of Keycloak 26.2
Default Statusaffected
Version 26.2-12
Version < *
Status unaffected
HerstellerRed Hat
Produkt Red Hat build of Keycloak 26.2.11
Default Statusunaffected
HerstellerRed Hat
Produkt Red Hat build of Keycloak 26.4
Default Statusaffected
Version 26.4.4-1
Version < *
Status unaffected
HerstellerRed Hat
Produkt Red Hat build of Keycloak 26.4
Default Statusaffected
Version 26.4-3
Version < *
Status unaffected
HerstellerRed Hat
Produkt Red Hat build of Keycloak 26.4
Default Statusaffected
Version 26.4-3
Version < *
Status unaffected
HerstellerRed Hat
Produkt Red Hat build of Keycloak 26.4.4
Default Statusunaffected
VulnDex Vulnerability Enrichment
Diese Information steht angemeldeten Benutzern zur Verfügung. Login Login
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.02% 0.031
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
secalert@redhat.com 6 0.8 5.2
CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:N
CWE-384 Session Fixation

Authenticating a user, or otherwise establishing a new user session, without invalidating any existing session identifier gives an attacker the opportunity to steal authenticated sessions.