CVE-2025-27817
Java vulnerability analysis and mitigation

Overview

A possible arbitrary file read and Server-Side Request Forgery (SSRF) vulnerability has been identified in Apache Kafka Client versions 3.1.0 through 3.9.0. The vulnerability was discovered and disclosed on June 9, 2025, affecting Apache Kafka Clients that accept configuration data for SASL/OAUTHBEARER connection with brokers (Kafka CVE List, OSS Security).

Technical details

The vulnerability stems from the way Apache Kafka Clients handle configuration parameters 'sasl.oauthbearer.token.endpoint.url' and 'sasl.oauthbearer.jwks.endpoint.url'. These parameters can be exploited to read arbitrary files and return their content in error logs, or to send requests to unintended locations. The vulnerability has been assigned a CVSS v3.1 base score of 7.5 (HIGH) with vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating high severity with potential for unauthorized information disclosure (NVD).

Impact

In applications where Apache Kafka Clients configurations can be specified by an untrusted party, attackers can exploit this vulnerability to read arbitrary contents of the disk and environment variables or make requests to unintended locations. This is particularly concerning in Apache Kafka Connect environments, where the vulnerability can be used to escalate from REST API access to filesystem/environment/URL access, posing significant risks especially in SaaS products (Kafka CVE List).

Mitigation and workarounds

Since Apache Kafka 3.9.1/4.0.0, a system property '-Dorg.apache.kafka.sasl.oauthbearer.allowed.urls' has been introduced to set the allowed URLs in SASL JAAS configuration. In version 3.9.1, it accepts all URLs by default for backward compatibility, while in 4.0.0 and newer versions, the default value is an empty list and users must explicitly set the allowed URLs. Users are advised to upgrade to version 3.9.1 or later and configure the JVM system property appropriately (Kafka CVE List).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management