Persistent Access Flaw in Keycloak: Unauthorized Resource Access After Role Mapping Change and Token Expiration

Persistent Access Flaw in Keycloak: Unauthorized Resource Access After Role Mapping Change and Token Expiration

CVE-2020-1725 · MEDIUM Severity

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

A flaw was found in keycloak before version 13.0.0. In some scenarios a user still has access to a resource after changing the role mappings in Keycloak and after expiration of the previous access token.

Learn more about our Cis Benchmark Audit For Apple Ios.