NIXPKGS-2026-0073
GitHub issue
published on
Permalink
CVE-2025-11429
5.4 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): NONE
by @LeSuisse Activity log
- Created suggestion
-
@LeSuisse
ignored
4 packages
- terraform-providers.keycloak
- python312Packages.python-keycloak
- python313Packages.python-keycloak
- terraform-providers.keycloak_keycloak
- @LeSuisse accepted
- @LeSuisse published on GitHub
Keycloak-server: too long and not settings compliant session
A flaw was found in Keycloak. Keycloak does not immediately enforce the disabling of the "Remember Me" realm setting on existing user sessions. Sessions created while "Remember Me" was active retain their extended session lifetime until they expire, overriding the administrator's recent security configuration change. This is a logic flaw in session management increases the potential window for successful session hijacking or unauthorized long-term access persistence. The flaw lies in the session expiration logic relying on the session-local "remember-me" flag without validating the current realm-level configuration.
References
Affected products
keycloak
- <26.4.1
rhbk/keycloak-rhel9
- *
rhbk/keycloak-rhel9-operator
- *
rhbk/keycloak-operator-bundle
- *
Red Hat build of Keycloak 26.2.11
Matching in nixpkgs
Ignored packages (4)
pkgs.terraform-providers.keycloak
None
pkgs.python312Packages.python-keycloak
Provides access to the Keycloak API
pkgs.python313Packages.python-keycloak
Provides access to the Keycloak API
pkgs.terraform-providers.keycloak_keycloak
None
Package maintainers
-
@leona-ya Leona Maroni <nix@leona.is>
-
@NickCao Nick Cao <nickcao@nichi.co>
-
@ngerstle Nicholas Gerstle <ngerstle@gmail.com>
-
@talyz Kim Lindberger <kim.lindberger@gmail.com>