CVE-2026-33557Improper Validation of Specified Index, Position, or Offset in Input in Software Foundation Apache Kafka

Severity
9.1CRITICALNVD
EPSS
0.2%
top 58.09%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 20

Description

A possible security vulnerability has been identified in Apache Kafka. By default, the broker property `sasl.oauthbearer.jwt.validator.class` is set to `org.apache.kafka.common.security.oauthbearer.DefaultJwtValidator`. It accepts any JWT token without validating its signature, issuer, or audience. An attacker can generate a JWT token from any issuer with the `preferred_username` set to any user, and the broker will accept it. We advise the Kafka users using kafka v4.1.0 or v4.1.1 to set the c

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:NExploitability: 3.9 | Impact: 5.2

🔴Vulnerability Details

3
GHSA
Apache Kafka does not validate JWT tokens in its OAUTHBEARER authentication implementation2026-04-20
GHSA
GHSA-28jg-cgg7-j4wc: A possible security vulnerability has been identified in Apache Kafka2026-04-20
VulDB
Apache Kafka 4.1.0 JWT Token improper authentication2026-04-17

📋Vendor Advisories

1
Red Hat
kafka: Apache Kafka: Authentication bypass via improper JWT validation2026-04-20

💬Community

1
Bugzilla
CVE-2026-33557 kafka: Apache Kafka: Authentication bypass via improper JWT validation2026-04-20