VYPR
High severityNVD Advisory· Published Jun 10, 2025· Updated Jun 10, 2025

Apache Kafka: Possible RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration

CVE-2025-27819

Description

In CVE-2023-25194, we announced the RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration in Kafka Connect API. But not only Kafka Connect API is vulnerable to this attack, the Apache Kafka brokers also have this vulnerability. To exploit this vulnerability, the attacker needs to be able to connect to the Kafka cluster and have the AlterConfigs permission on the cluster resource.

Since Apache Kafka 3.4.0, we have added a system property ("-Dorg.apache.kafka.disallowed.login.modules") to disable the problematic login modules usage in SASL JAAS configuration. Also by default "com.sun.security.auth.module.JndiLoginModule" is disabled in Apache Kafka 3.4.0, and "com.sun.security.auth.module.JndiLoginModule,com.sun.security.auth.module.LdapLoginModule" is disabled by default in in Apache Kafka 3.9.1/4.0.0

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Apache Kafka brokers are vulnerable to RCE or denial of service via SASL JAAS JndiLoginModule, requiring cluster access and AlterConfigs permission.

Root

Cause Apache Kafka brokers, not just the Kafka Connect API, are susceptible to a remote code execution (RCE) or denial of service (DoS) attack through the SASL JAAS JndiLoginModule configuration. This vulnerability extends the previously disclosed CVE-2023-25194, which initially targeted the Kafka Connect API. The issue stems from the ability to configure the com.sun.security.auth.module.JndiLoginModule in the JAAS configuration for broker clients, enabling JNDI-based LDAP lookups that can be abused for deserialization attacks [2].

Exploitation

Prerequisites To exploit this vulnerability, an attacker must be able to connect to the Kafka cluster and possess the AlterConfigs permission on the cluster resource. This allows the attacker to modify the broker's SASL JAAS configuration to include the JndiLoginModule, which, when triggered, connects to an attacker-controlled LDAP server. The LDAP server returns a serialized Java object that, if gadget chains are present in the classpath, leads to arbitrary code execution [1].

Impact

Successful exploitation can result in remote code execution, giving the attacker full control over the affected Kafka broker, or a denial of service condition. The vulnerability can be exploited via broker configuration, making it critical for organizations running Apache Kafka versions prior to the mitigated releases [2].

Mitigation

Starting with Apache Kafka 3.4.0, a system property -Dorg.apache.kafka.disallowed.login.modules was introduced to disable problematic login modules. By default, com.sun.security.auth.module.JndiLoginModule is disabled in Kafka 3.4.0, and from versions 3.9.1 and 4.0.0, both JndiLoginModule and LdapLoginModule are disabled by default. Users are strongly advised to upgrade to these patched versions or apply the system property to block usage of the vulnerable login modules [2].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.kafka:kafka_2.10Maven
>= 0
org.apache.kafka:kafka_2.11Maven
>= 0
org.apache.kafka:kafka_2.12Maven
< 3.4.03.4.0
org.apache.kafka:kafka_2.13Maven
< 3.4.03.4.0
org.apache.kafka:kafka_2.8.0Maven
>= 0
org.apache.kafka:kafka_2.8.2Maven
>= 0
org.apache.kafka:kafka_2.9.1Maven
>= 0
org.apache.kafka:kafka_2.9.2Maven
>= 0

Affected products

11

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.