Bug 2402148 (CVE-2025-11429) - CVE-2025-11429 keycloak-server: Too long and not settings compliant session
Summary: CVE-2025-11429 keycloak-server: Too long and not settings compliant session
Keywords:
Status: NEW
Alias: CVE-2025-11429
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
medium
medium
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2025-10-07 12:46 UTC by OSIDB Bzimport
Modified: 2025-10-07 12:52 UTC (History)
7 users (show)

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2025-10-07 12:46:16 UTC
Keycloak does not immediately enforce the disabling of the "Remember Me" realm setting on existing user sessions. Sessions created while "Remember Me" was active retain their extended session lifetime until they expire, overriding the administrator's recent security configuration change. This is a logic flaw in session management increases the potential window for successful session hijacking or unauthorized long-term access persistence. The flaw lies in the session expiration logic relying on the session-local "remember-me" flag without validating the current realm-level configuration.

Requirements to exploit

An attacker who has previously compromised a long-lived "Remember Me" session (e.g., stole the identity cookie) can maintain access for the full original remember-me lifetime, even after an administrator has attempted to revoke that extended persistence by disabling the feature globally. No direct user-interaction is required.


Note You need to log in before you can comment on or make changes to this bug.