Keycloak vulnerable to session takeovers due to reuse of session identifiers
Moderate severity
GitHub Reviewed
Published
Oct 28, 2025
to the GitHub Advisory Database
•
Updated Nov 14, 2025
Description
Published by the National Vulnerability Database
Oct 28, 2025
Published to the GitHub Advisory Database
Oct 28, 2025
Reviewed
Oct 29, 2025
Last updated
Nov 14, 2025
A flaw was found in Keycloak. In Keycloak where a user can accidentally get access to another user's session if both use the same device and browser. This happens because Keycloak sometimes reuses session identifiers and doesn’t clean up properly during logout when browser cookies are missing. As a result, one user may receive tokens that belong to another user.
References