Apache Kafka vulnerabilities

13 known vulnerabilities affecting apache/kafka.

Total CVEs
13
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
HIGH7MEDIUM6

Vulnerabilities

Page 1 of 1
CVE-2025-27819HIGHCVSS 7.5≥ 2.0.0, ≤ 3.3.22025-06-10
CVE-2025-27819 [HIGH] CVE-2025-27819: In CVE-2023-25194, we announced the RCE/Denial of service attack via SASL JAAS JndiLoginModule confi In CVE-2023-25194, we announced the RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration in Kafka Connect API. But not only Kafka Connect API is vulnerable to this attack, the Apache Kafka brokers also have this vulnerability. To exploit this vulnerability, the attacker needs to be able to connect to the Kafka cluster and have the AlterCon
nvd
CVE-2025-27818HIGHCVSS 8.8≥ 2.3.0, < 3.9.12025-06-10
CVE-2025-27818 [HIGH] CWE-502 CVE-2025-27818: A possible security vulnerability has been identified in Apache Kafka. This requires access to a alt A possible security vulnerability has been identified in Apache Kafka. This requires access to a alterConfig to the cluster resource, or Kafka Connect worker, and the ability to create/modify connectors on it with an arbitrary Kafka client SASL JAAS config and a SASL-based security protocol, which has been possible on Kafka clusters since Apache Kafka
nvd
CVE-2025-27817HIGHCVSS 7.5PoC≥ 3.1.0, < 3.9.12025-06-10
CVE-2025-27817 [HIGH] CWE-918 CVE-2025-27817: A possible arbitrary file read and SSRF vulnerability has been identified in Apache Kafka Client. Ap A possible arbitrary file read and SSRF vulnerability has been identified in Apache Kafka Client. Apache Kafka Clients accept configuration data for setting the SASL/OAUTHBEARER connection with the brokers, including "sasl.oauthbearer.token.endpoint.url" and "sasl.oauthbearer.jwks.endpoint.url". Apache Kafka allows clients to read an arbitrary file an
nvd
CVE-2024-56128MEDIUMCVSS 5.3≥ 0.10.2.0, < 3.7.2v3.8.02024-12-18
CVE-2024-56128 [MEDIUM] CWE-303 CVE-2024-56128: Incorrect Implementation of Authentication Algorithm in Apache Kafka's SCRAM implementation. Issue Incorrect Implementation of Authentication Algorithm in Apache Kafka's SCRAM implementation. Issue Summary: Apache Kafka's implementation of the Salted Challenge Response Authentication Mechanism (SCRAM) did not fully adhere to the requirements of RFC 5802 [1]. Specifically, as per RFC 5802, the server must verify that the nonce sent by the client i
nvd
CVE-2024-31141MEDIUMCVSS 6.5≥ 2.3.0, ≤ 3.5.2≥ 3.6.0, ≤ 3.6.2+1 more2024-11-19
CVE-2024-31141 [MEDIUM] CWE-269 CVE-2024-31141: Files or Directories Accessible to External Parties, Improper Privilege Management vulnerability in Files or Directories Accessible to External Parties, Improper Privilege Management vulnerability in Apache Kafka Clients. Apache Kafka Clients accept configuration data for customizing behavior, and includes ConfigProvider plugins in order to manipulate these configurations. Apache Kafka also provides FileConfigProvider, DirectoryConfigProvider, and
nvd
CVE-2024-27309HIGHCVSS 7.4≥ 3.5.0, ≤ 3.6.12024-04-12
CVE-2024-27309 [HIGH] CWE-863 CVE-2024-27309: While an Apache Kafka cluster is being migrated from ZooKeeper mode to KRaft mode, in some cases ACL While an Apache Kafka cluster is being migrated from ZooKeeper mode to KRaft mode, in some cases ACLs will not be correctly enforced. Two preconditions are needed to trigger the bug: 1. The administrator decides to remove an ACL 2. The resource associated with the removed ACL continues to have two or more other ACLs associated with it after the remov
nvd
CVE-2022-34917HIGHCVSS 7.5≥ 2.8.0, < 2.8.2≥ 3.0.0, < 3.0.2+2 more2022-09-20
CVE-2022-34917 [HIGH] CWE-789 CVE-2022-34917: A security vulnerability has been identified in Apache Kafka. It affects all releases since 2.8.0. T A security vulnerability has been identified in Apache Kafka. It affects all releases since 2.8.0. The vulnerability allows malicious unauthenticated clients to allocate large amounts of memory on brokers. This can lead to brokers hitting OutOfMemoryException and causing denial of service. Example scenarios: - Kafka cluster without authentication: Any
nvd
CVE-2021-38153MEDIUMCVSS 5.9≥ 2.0.0, < 2.6.3≥ 2.7.0, < 2.7.2+1 more2021-09-22
CVE-2021-38153 [MEDIUM] CWE-203 CVE-2021-38153: Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerab Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. Users should upgrade to 2.8.1 or higher, or 3.0.0 or higher where this vulnerability has been fixed. The affected versions include Apache Kafka 2.0.0
nvd
CVE-2020-27218MEDIUMCVSS 4.8v2.7.02020-11-28
CVE-2020-27218 [MEDIUM] CWE-226 CVE-2020-27218: In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.al In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is received entirely but not consumed by the applicati
nvd
CVE-2019-12399HIGHCVSS 7.5v2.0.0v2.0.1+6 more2020-01-14
CVE-2019-12399 [HIGH] CWE-319 CVE-2019-12399: When Connect workers in Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, or 2.3.0 are configur When Connect workers in Apache Kafka 2.0.0, 2.0.1, 2.1.0, 2.1.1, 2.2.0, 2.2.1, or 2.3.0 are configured with one or more config providers, and a connector is created/updated on that Connect cluster to use an externalized secret variable in a substring of a connector configuration property value, then any client can issue a request to the same Connect c
cvelistv5nvd
CVE-2018-17196HIGHCVSS 8.8≥ 0.11.0.0, ≤ 2.1.0v0.11.0.0 to 2.1.02019-07-11
CVE-2018-17196 [HIGH] CVE-2018-17196: In Apache Kafka versions between 0.11.0.0 and 2.1.0, it is possible to manually craft a Produce requ In Apache Kafka versions between 0.11.0.0 and 2.1.0, it is possible to manually craft a Produce request which bypasses transaction/idempotent ACL validation. Only authenticated clients with Write permission on the respective topics are able to exploit this vulnerability. Users should upgrade to 2.1.1 or later where this vulnerability has been fixed.
cvelistv5nvd
CVE-2017-12610MEDIUMCVSS 6.8≥ 0.10.0.0, ≤ 0.10.2.1≥ 0.11.0.0, ≤ 0.11.0.12018-07-26
CVE-2017-12610 [MEDIUM] CWE-287 CVE-2017-12610: In Apache Kafka 0.10.0.0 to 0.10.2.1 and 0.11.0.0 to 0.11.0.1, authenticated Kafka clients may use i In Apache Kafka 0.10.0.0 to 0.10.2.1 and 0.11.0.0 to 0.11.0.1, authenticated Kafka clients may use impersonation via a manually crafted protocol message with SASL/PLAIN or SASL/SCRAM authentication when using the built-in PLAIN or SCRAM server implementations in Apache Kafka.
nvd
CVE-2018-1288MEDIUMCVSS 5.4≤ 0.9.0.1≥ 0.10.0.0, ≤ 0.10.2.1+2 more2018-07-26
CVE-2018-1288 [MEDIUM] CVE-2018-1288: In Apache Kafka 0.9.0.0 to 0.9.0.1, 0.10.0.0 to 0.10.2.1, 0.11.0.0 to 0.11.0.2, and 1.0.0, authentic In Apache Kafka 0.9.0.0 to 0.9.0.1, 0.10.0.0 to 0.10.2.1, 0.11.0.0 to 0.11.0.2, and 1.0.0, authenticated Kafka users may perform action reserved for the Broker via a manually created fetch request interfering with data replication, resulting in data loss.
nvd