CVE-2023-6787
Severity CVSS v4.0:
Pending analysis
Type:
CWE-287
Authentication Issues
Publication date:
25/04/2024
Last modified:
30/06/2025
Description
A flaw was found in Keycloak that occurs from an error in the re-authentication mechanism within org.keycloak.authentication. This flaw allows hijacking an active Keycloak session by triggering a new authentication process with the query parameter "prompt=login," prompting the user to re-enter their credentials. If the user cancels this re-authentication by selecting "Restart login," an account takeover may occur, as the new session, with a different SUB, will possess the same SID as the previous session.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:redhat:build_of_keycloak:-:*:*:*:text-only:*:*:* | ||
| cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:* | 22.0.10 (excluding) | |
| cpe:2.3:a:redhat:keycloak:*:*:*:*:*:*:*:* | 23.0.0 (including) | 24.0.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://access.redhat.com/errata/RHSA-2024:1867
- https://access.redhat.com/errata/RHSA-2024:1868
- https://access.redhat.com/security/cve/CVE-2023-6787
- https://bugzilla.redhat.com/show_bug.cgi?id=2254375
- https://github.com/keycloak/keycloak/security/advisories/GHSA-c9h6-v78w-52wj
- https://access.redhat.com/errata/RHSA-2024:1867
- https://access.redhat.com/errata/RHSA-2024:1868
- https://access.redhat.com/security/cve/CVE-2023-6787
- https://bugzilla.redhat.com/show_bug.cgi?id=2254375



