CVE-2025-27819

Severity
7.5HIGH
EPSS
0.9%
top 24.38%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 10

Description

In CVE-2023-25194, we announced the RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration in Kafka Connect API. But not only Kafka Connect API is vulnerable to this attack, the Apache Kafka brokers also have this vulnerability. To exploit this vulnerability, the attacker needs to be able to connect to the Kafka cluster and have the AlterConfigs permission on the cluster resource. Since Apache Kafka 3.4.0, we have added a system property ("-Dorg.apache.kafka.disallowed.login.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages4 packages

NVDapache/kafka2.0.03.3.2
CVEListV5apache_software_foundation/apache_kafka2.0.03.3.2

🔴Vulnerability Details

3
GHSA
Apache Kafka Deserialization of Untrusted Data vulnerability2025-06-10
CVEList
Apache Kafka: Possible RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration2025-06-10
OSV
Apache Kafka Deserialization of Untrusted Data vulnerability2025-06-10

📋Vendor Advisories

1
Red Hat
org.apache.kafka: Kafka JNDI Login Module RCE Vulnerability2025-06-10
CVE-2025-27819 (HIGH CVSS 7.5) | In CVE-2023-25194 | cvebase.io