{
  "threat_severity" : "Moderate",
  "public_date" : "2025-10-23T00:00:00Z",
  "bugzilla" : {
    "description" : "keycloak: org.keycloak:keycloak-services: User can refresh offline session even after client's offline_access scope was removed",
    "id" : "2406033",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2406033"
  },
  "cvss3" : {
    "cvss3_base_score" : "5.4",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-613",
  "details" : [ "A flaw was found in Keycloak. An offline session continues to be valid when the offline_access scope is removed from the client. The refresh token is accepted and you can continue to request new tokens for the session. As it can lead to a situation where an administrator removes the scope, and assumes that offline sessions are no longer available, but they are.", "A flaw was found in Keycloak. An offline session continues to be valid when the offline_access scope is removed from the client. The refresh token is accepted and you can continue to request new tokens for the session. As it can lead to a situation where an administrator removes the scope, and assumes that offline sessions are no longer available, but they are." ],
  "affected_release" : [ {
    "product_name" : "Red Hat build of Keycloak 26.2",
    "release_date" : "2025-11-25T00:00:00Z",
    "advisory" : "RHSA-2025:22088",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.2::el9",
    "package" : "rhbk/keycloak-operator-bundle:26.2.11-1"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.2",
    "release_date" : "2025-11-25T00:00:00Z",
    "advisory" : "RHSA-2025:22088",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.2::el9",
    "package" : "rhbk/keycloak-rhel9:26.2-12"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.2",
    "release_date" : "2025-11-25T00:00:00Z",
    "advisory" : "RHSA-2025:22088",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.2::el9",
    "package" : "rhbk/keycloak-rhel9-operator:26.2-12"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.2.11",
    "release_date" : "2025-11-25T00:00:00Z",
    "advisory" : "RHSA-2025:22089",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.2::el9"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.4",
    "release_date" : "2025-11-13T00:00:00Z",
    "advisory" : "RHSA-2025:21371",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "rhbk/keycloak-operator-bundle:26.4.4-1"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.4",
    "release_date" : "2025-11-13T00:00:00Z",
    "advisory" : "RHSA-2025:21371",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "rhbk/keycloak-rhel9:26.4-3"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.4",
    "release_date" : "2025-11-13T00:00:00Z",
    "advisory" : "RHSA-2025:21371",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "rhbk/keycloak-rhel9-operator:26.4-3"
  }, {
    "product_name" : "Red Hat build of Keycloak 26.4.4",
    "release_date" : "2025-11-13T00:00:00Z",
    "advisory" : "RHSA-2025:21370",
    "cpe" : "cpe:/a:redhat:build_keycloak:26.4::el9",
    "package" : "keycloak-server"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-12110\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-12110\nhttps://github.com/keycloak/keycloak/pull/43790" ],
  "name" : "CVE-2025-12110",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}