CVE-2025-12390: Keycloak vulnerable to session takeovers due to reuse of session identifiers
6
Basic Information
Technical Details
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.keycloak:keycloak-services | maven | <= 26.4.2 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
I have analyzed the vulnerability details for CVE-2025-12390 in Keycloak. The vulnerability is a session fixation issue where a user can accidentally gain access to another user's session due to the reuse of session identifiers during logout, especially when browser cookies are missing.
Based on the information from the Red Hat Bugzilla entry (2406793), the vulnerability is located in org.keycloak.protocol.oidc.endpoints.LogoutEndpoint. The bug report is titled "org.keycloak.protocol.oidc.endpoints.LogoutEndpoint: Offline Session takeover due to reused Authentication Session ID". This strongly indicates that the LogoutEndpoint class is responsible for handling the logout process and is the location of the flaw.
However, I was unable to find a specific commit or patch that fixes this vulnerability. The bugzilla status is "NEW", and there is no patched version mentioned in the advisory. This suggests that a patch may not be public yet.
Without a patch, I cannot definitively identify the exact vulnerable functions and provide code-level evidence. The vulnerability description and the bugzilla title point to the LogoutEndpoint class, but without seeing the code changes, it's impossible to pinpoint the specific methods involved in the session reuse logic.
Therefore, I cannot provide a confident analysis of the vulnerable functions at this time.