NIXPKGS-2026-0076
GitHub issue
published on
Permalink
CVE-2025-12110
5.4 MEDIUM
- CVSS version: 3.1
- Attack vector (AV): NETWORK
- Attack complexity (AC): LOW
- Privileges required (PR): LOW
- User interaction (UI): NONE
- Scope (S): UNCHANGED
- Confidentiality impact (C): LOW
- Integrity impact (I): LOW
- Availability impact (A): NONE
by @LeSuisse Activity log
- Created suggestion
-
@LeSuisse
ignored
4 packages
- terraform-providers.keycloak
- python312Packages.python-keycloak
- python313Packages.python-keycloak
- terraform-providers.keycloak_keycloak
- @LeSuisse accepted
- @LeSuisse published on GitHub
Keycloak: org.keycloak:keycloak-services: user can refresh offline session even after client's offline_access scope was removed
A flaw was found in Keycloak. An offline session continues to be valid when the offline_access scope is removed from the client. The refresh token is accepted and you can continue to request new tokens for the session. As it can lead to a situation where an administrator removes the scope, and assumes that offline sessions are no longer available, but they are.
References
Affected products
keycloak
- <26.4.3
keycloak-server
rhbk/keycloak-rhel9
- *
rhbk/keycloak-rhel9-operator
- *
rhbk/keycloak-operator-bundle
- *
Red Hat build of Keycloak 26.2.11
Matching in nixpkgs
Ignored packages (4)
pkgs.terraform-providers.keycloak
None
pkgs.python312Packages.python-keycloak
Provides access to the Keycloak API
pkgs.python313Packages.python-keycloak
Provides access to the Keycloak API
pkgs.terraform-providers.keycloak_keycloak
None
Package maintainers
-
@leona-ya Leona Maroni <nix@leona.is>
-
@NickCao Nick Cao <nickcao@nichi.co>
-
@ngerstle Nicholas Gerstle <ngerstle@gmail.com>
-
@talyz Kim Lindberger <kim.lindberger@gmail.com>