Keycloak vulnerable to session takeovers due to reuse of session identifiers
        
  Moderate severity
        
          GitHub Reviewed
      
        Published
          Oct 28, 2025 
          to the GitHub Advisory Database
          •
          Updated Oct 29, 2025 
      
  
Description
        Published by the National Vulnerability Database
      Oct 28, 2025 
    
  
        Published to the GitHub Advisory Database
      Oct 28, 2025 
    
  
        Reviewed
      Oct 29, 2025 
    
  
        Last updated
      Oct 29, 2025 
    
  
A flaw was found in Keycloak. In Keycloak where a user can accidentally get access to another user's session if both use the same device and browser. This happens because Keycloak sometimes reuses session identifiers and doesn’t clean up properly during logout when browser cookies are missing. As a result, one user may receive tokens that belong to another user.
References