-
CVSS Score
-Basic Information
CVE ID
-
GHSA ID
-
EPSS Score
-
CWE
-
Published
-
Updated
-
KEV Status
-
Technology
-
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.keycloak:keycloak-model-jpa | maven | < 21.0.0 | 21.0.0 |
The vulnerability stemmed from inefficient query strategies in offline session handling. The pre-patch version of loadUserSessionsWithClientSessions used range-based queries (via findClientSessionsOrderedById) that loaded all client sessions between arbitrary session ID boundaries. When users with millions of sessions accessed the consents tab, this resulted in loading exponentially more client sessions than needed. The patch introduced 'useExact' parameter control and split the query into exact (IN clause) and range-based versions, demonstrating the original functions' vulnerability to unbounded resource allocation.