All interaction with the resource owner is performed by the client. Thus it might, intentionally or unintentionally, happen that the client obtains a long-term authorization represented by a refresh token even if the resource owner did not intend so.
OAuth 2.0 Threat Model and Security Considerations (RFC6819, section 4.4.3.3)
This threat is considered fully mitigated if all the test cases from the following test set succeed.
Back to the threat overview