CVE-2025-11429
Java vulnerability analysis and mitigation

Overview

A logic flaw (CVE-2025-11429) was discovered in Keycloak's session management system on October 7, 2025. The vulnerability affects Keycloak's handling of the "Remember Me" realm setting, where the system fails to immediately enforce the disabling of this feature on existing user sessions. This flaw impacts Keycloak versions prior to 26.4.1, particularly affecting the org.keycloak:keycloak-services package (Miggo Database, Red Hat CVE).

Technical details

The vulnerability has been assigned a CVSS v3.1 score of 5.4 with the vector CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N. The flaw is categorized as CWE-613 and lies in the session expiration logic, which relies on the session-local "remember-me" flag without validating the current realm-level configuration. The issue specifically occurs in the isSessionValid function within AuthenticationManager.java, where sessions created with "Remember Me" enabled retain their extended session lifetime even after the feature is disabled at the realm level (Miggo Database).

Impact

When exploited, this vulnerability allows sessions created while "Remember Me" was active to retain their extended session lifetime until they expire, effectively overriding the administrator's security configuration changes. This increases the potential window for successful session hijacking and unauthorized long-term access persistence (Debian Tracker, Red Hat CVE).

Mitigation and workarounds

The vulnerability has been patched in Keycloak version 26.4.1. The fix includes modifications to the isSessionValid method in AuthenticationManager.java, adding explicit checks to validate if a user session has the rememberMe flag set while the realm has disabled the rememberMe feature. Red Hat notes that for unpatched systems, mitigation options are either not available or do not meet their Product Security criteria for ease of use, deployment, and stability (Miggo Database, Red Hat CVE).

Community reactions

The vulnerability was discovered by Alexander Schwartz of Red Hat, highlighting the ongoing security research efforts within the company. The issue has been classified as having moderate severity by Red Hat (Red Hat CVE).

Additional resources


SourceThis report was generated using AI

Related Java vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55754CRITICAL9.6
  • JavaJava
  • tomcat6-webapps
NoYesOct 27, 2025
CVE-2025-62782MEDIUM5.9
  • JavaJava
  • de.themoep:inventorygui
NoYesOct 27, 2025
CVE-2025-62784MEDIUM5.3
  • JavaJava
  • de.themoep:inventorygui
NoYesOct 27, 2025
CVE-2025-61795MEDIUM5.3
  • JavaJava
  • tomcat-docs-webapp
NoYesOct 27, 2025
CVE-2025-62783MEDIUM5
  • JavaJava
  • de.themoep:inventorygui
NoYesOct 27, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management