A flaw was found in Keycloak
The Keycloak OpenID Connect (OIDC) Introspection feature has a vulnerability that fails to properly honor realm-level revocation policies. This can lead to unauthorized access or continued session validity. Developers should ensure proper policy configuration and implementation to prevent such issues.
A flaw was found in Keycloak. When both realm-level and client-level `notBefore` revocation policies are configured, Keycloak's OpenID Connect (OIDC) Introspection feature fails to properly honor the realm-level policy. This allows tokens that should have been revoked to remain active, potentially leading to unauthorized access or continued session validity. This could impact the security of systems utilizing Keycloak for identity and access management.
Keycloak users are at risk of unauthorized access or continued session validity, which can lead to moderate security issues and data exposure.
Monitor & Review
Low severity — keep this CVE on your radar and patch during routine maintenance.
What should I do?
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
0
Affected Products
2
References
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Exploitability
Impact