Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-1185 | A flaw was found in Keycloak that occurs from an error in the re-authentication mechanism within org.keycloak.authentication. This flaw allows hijacking an active Keycloak session by triggering a new authentication process with the query parameter "prompt=login," prompting the user to re-enter their credentials. If the user cancels this re-authentication by selecting "Restart login," an account takeover may occur, as the new session, with a different SUB, will possess the same SID as the previous session. |
Github GHSA |
GHSA-c9h6-v78w-52wj | Keycloak vulnerable to session hijacking via re-authentication |
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Mon, 30 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat build Of Keycloak
Redhat keycloak |
|
| CPEs | cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:text-only:*:*:* cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:* |
|
| Vendors & Products |
Redhat build Of Keycloak
Redhat keycloak |
Fri, 14 Mar 2025 02:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 13 Nov 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2025-11-11T15:57:32.291Z
Reserved: 2023-12-13T16:22:00.344Z
Link: CVE-2023-6787
Updated: 2024-08-02T08:42:07.631Z
Status : Analyzed
Published: 2024-04-25T16:15:10.867
Modified: 2025-06-30T13:49:15.333
Link: CVE-2023-6787
OpenCVE Enrichment
No data.
EUVD
Github GHSA