Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-7575 | A flaw was found in the offline_access scope in Keycloak. This issue would affect users of shared computers more (especially if cookies are not cleared), due to a lack of root session validation, and the reuse of session ids across root and user authentication sessions. This enables an attacker to resolve a user session attached to a previously authenticated user; when utilizing the refresh token, they will be issued a token for the original user. |
Github GHSA |
GHSA-97g8-xfvw-q4hg | Keycloak vulnerable to session takeover with OIDC offline refreshtokens |
Wed, 25 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Subscriptions
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-03T01:20:58.791Z
Reserved: 2022-11-09T16:12:41.804Z
Link: CVE-2022-3916
Updated: 2024-08-03T01:20:58.791Z
Status : Modified
Published: 2023-09-20T15:15:11.583
Modified: 2024-11-21T07:20:31.480
Link: CVE-2022-3916
OpenCVE Enrichment
No data.
EUVD
Github GHSA