strimzi-kafka-operator

Direct Vulnerabilities

Known vulnerabilities in the strimzi-kafka-operator package. This does not include vulnerabilities belonging to this package’s dependencies.

Fix vulnerabilities automatically

Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

Fix for free
VulnerabilityVulnerable Version
  • L
GHSA-wf66-mphr-4c4r

<0.51.0-r24
  • L
Information Exposure Through Server Log Files

<0.51.0-r24
  • L
GHSA-5qcv-4rpc-jp93

<0.51.0-r24
  • L
Race Condition

<0.51.0-r24
  • H
Improper Encoding or Escaping of Output

<0.51.0-r22
  • L
GHSA-445c-vh5m-36rj

<0.51.0-r22
  • H
Improper Encoding or Escaping of Output

<0.51.0-r22
  • H
Improper Output Neutralization for Logs

<0.51.0-r22
  • L
GHSA-w35j-pv5h-q9q9

<0.51.0-r22
  • L
GHSA-6hg6-v5c8-fphq

<0.51.0-r22
  • L
GHSA-3pxv-7cmr-fjr4

<0.51.0-r22
  • M
Improper Validation of Certificate with Host Mismatch

<0.51.0-r22
  • H
Allocation of Resources Without Limits or Throttling

<0.51.0-r22
  • L
GHSA-w9fj-cfpg-grvv

<0.51.0-r22
  • L
GHSA-pwqr-wmgm-9rr8

<0.51.0-r22
  • L
HTTP Request Smuggling

<0.51.0-r22
  • L
CVE-2025-12183

<0.51.0-r2
  • L
GHSA-cmp6-m4wj-q63q

<0.51.0-r2
  • L
Information Exposure

<0.51.0-r2
  • L
GHSA-vqf4-7m7x-wgfc

<0.51.0-r2
  • L
GHSA-crhr-qqj8-rpxc

<0.51.0-r1
  • H
Information Exposure Through Log Files

<0.51.0-r1
  • L
GHSA-7xrh-hqfc-g7qr

<0.51.0-r1
  • H
Improper Certificate Validation

<0.51.0-r1
  • L
GHSA-72hv-8253-57qq

<0.51.0-r0
  • L
GHSA-xxh7-fcf3-rj7f

<0.50.1-r4
  • L
Resource Exhaustion

<0.50.1-r4
  • L
GHSA-cphf-4846-3xx9

<0.50.0-r0
  • M
HTTP Request Smuggling

<0.50.0-r0
  • L
GHSA-vc5p-v9hr-52mj

<0.49.1-r2
  • M
Improper Certificate Validation

<0.49.1-r2
  • L
CVE-2024-29371

<0.49.1-r5
  • L
GHSA-3677-xxcr-wjqv

<0.49.1-r5
  • H
Files or Directories Accessible to External Parties

<0.48.0-r1
  • M
Cross-site Scripting (XSS)

<0.48.0-r1
  • L
Improper Handling of Insufficient Permissions or Privileges

<0.47.0-r8
  • H
Improper Handling of Highly Compressed Data (Data Amplification)

<0.47.0-r7
  • H
HTTP Request Smuggling

<0.47.0-r7
  • H
Allocation of Resources Without Limits or Throttling

<0.47.0-r3
  • L
CVE-2024-56128

<0.46.1-r0
  • L
CVE-2025-27817

<0.46.0-r6
  • L
CVE-2025-48734

<0.46.0-r5
  • L
Resource Exhaustion

<0.45.0-r2
  • M
Allocation of Resources Without Limits or Throttling

<0.45.0-r1
  • L
CVE-2025-24970

<0.47.0-r1
  • L
Improper Privilege Management

<0.44.0-r2