CVE-2025-11429: Keycloak does not invalidate sessions when "Remember Me" is disabled
A flaw was found in Keycloak. Keycloak does not immediately enforce the disabling of the “Remember Me” realm setting on existing user sessions. Sessions created while “Remember Me” was active retain their extended session lifetime until they expire, overriding the administrator’s recent security configuration change. This is a logic flaw in session management increases the potential window for successful session hijacking or unauthorized long-term access persistence. The flaw lies in the session expiration logic relying on the session-local “remember-me” flag without validating the current realm-level configuration.
References
- access.redhat.com/security/cve/CVE-2025-11429
- bugzilla.redhat.com/show_bug.cgi?id=2402148
- github.com/advisories/GHSA-64w3-5q9m-68xf
- github.com/keycloak/keycloak
- github.com/keycloak/keycloak/commit/a34094100716b7c69ae38eaed6678ab4344d0a1d
- github.com/keycloak/keycloak/commit/bda0e2a67c8cf41d1b3d9010e6dfcddaf79bf59b
- github.com/keycloak/keycloak/issues/43328
- nvd.nist.gov/vuln/detail/CVE-2025-11429
Code Behaviors & Features
Detect and mitigate CVE-2025-11429 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →