Apache Kafka: Possible RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration
Description
In CVE-2023-25194, we announced the RCE/Denial of service attack via SASL JAAS JndiLoginModule configuration in Kafka Connect API. But not only Kafka Connect API is vulnerable to this attack, the Apache Kafka brokers also have this vulnerability. To exploit this vulnerability, the attacker needs to be able to connect to the Kafka cluster and have the AlterConfigs permission on the cluster resource.
Since Apache Kafka 3.4.0, we have added a system property ("-Dorg.apache.kafka.disallowed.login.modules") to disable the problematic login modules usage in SASL JAAS configuration. Also by default "com.sun.security.auth.module.JndiLoginModule" is disabled in Apache Kafka 3.4.0, and "com.sun.security.auth.module.JndiLoginModule,com.sun.security.auth.module.LdapLoginModule" is disabled by default in in Apache Kafka 3.9.1/4.0.0
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache Kafka brokers are vulnerable to RCE or denial of service via SASL JAAS JndiLoginModule, requiring cluster access and AlterConfigs permission.
Root
Cause Apache Kafka brokers, not just the Kafka Connect API, are susceptible to a remote code execution (RCE) or denial of service (DoS) attack through the SASL JAAS JndiLoginModule configuration. This vulnerability extends the previously disclosed CVE-2023-25194, which initially targeted the Kafka Connect API. The issue stems from the ability to configure the com.sun.security.auth.module.JndiLoginModule in the JAAS configuration for broker clients, enabling JNDI-based LDAP lookups that can be abused for deserialization attacks [2].
Exploitation
Prerequisites To exploit this vulnerability, an attacker must be able to connect to the Kafka cluster and possess the AlterConfigs permission on the cluster resource. This allows the attacker to modify the broker's SASL JAAS configuration to include the JndiLoginModule, which, when triggered, connects to an attacker-controlled LDAP server. The LDAP server returns a serialized Java object that, if gadget chains are present in the classpath, leads to arbitrary code execution [1].
Impact
Successful exploitation can result in remote code execution, giving the attacker full control over the affected Kafka broker, or a denial of service condition. The vulnerability can be exploited via broker configuration, making it critical for organizations running Apache Kafka versions prior to the mitigated releases [2].
Mitigation
Starting with Apache Kafka 3.4.0, a system property -Dorg.apache.kafka.disallowed.login.modules was introduced to disable problematic login modules. By default, com.sun.security.auth.module.JndiLoginModule is disabled in Kafka 3.4.0, and from versions 3.9.1 and 4.0.0, both JndiLoginModule and LdapLoginModule are disabled by default. Users are strongly advised to upgrade to these patched versions or apply the system property to block usage of the vulnerable login modules [2].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.kafka:kafka_2.10Maven | >= 0 | — |
org.apache.kafka:kafka_2.11Maven | >= 0 | — |
org.apache.kafka:kafka_2.12Maven | < 3.4.0 | 3.4.0 |
org.apache.kafka:kafka_2.13Maven | < 3.4.0 | 3.4.0 |
org.apache.kafka:kafka_2.8.0Maven | >= 0 | — |
org.apache.kafka:kafka_2.8.2Maven | >= 0 | — |
org.apache.kafka:kafka_2.9.1Maven | >= 0 | — |
org.apache.kafka:kafka_2.9.2Maven | >= 0 | — |
Affected products
11- osv-coords9 versionspkg:bitnami/kafkapkg:maven/org.apache.kafka/kafka_2.10pkg:maven/org.apache.kafka/kafka_2.11pkg:maven/org.apache.kafka/kafka_2.12pkg:maven/org.apache.kafka/kafka_2.13pkg:maven/org.apache.kafka/kafka_2.8.0pkg:maven/org.apache.kafka/kafka_2.8.2pkg:maven/org.apache.kafka/kafka_2.9.1pkg:maven/org.apache.kafka/kafka_2.9.2
>= 2.0.0, < 3.4.1+ 8 more
- (no CPE)range: >= 2.0.0, < 3.4.1
- (no CPE)range: >= 0
- (no CPE)range: >= 0
- (no CPE)range: < 3.4.0
- (no CPE)range: < 3.4.0
- (no CPE)range: >= 0
- (no CPE)range: >= 0
- (no CPE)range: >= 0
- (no CPE)range: >= 0
- Apache Software Foundation/Apache Kafkav5Range: 2.0.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-26f8-x7cc-wqpcghsaADVISORY
- github.com/advisories/GHSA-mcwh-c9pg-xw43ghsaADVISORY
- kafka.apache.org/cve-listghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2025-27819ghsaADVISORY
News mentions
0No linked articles in our index yet.