Incorrect Authorization Affecting io.strimzi:strimzi package, versions [0.47.0-RC1,0.49.1-RC1)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (2nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Incorrect Authorization vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-IOSTRIMZI-14220412
  • published8 Dec 2025
  • disclosed5 Dec 2025
  • creditJakub Scholz

Introduced: 5 Dec 2025

NewCVE-2025-66623  (opens in a new tab)
CWE-863  (opens in a new tab)

How to fix?

Upgrade io.strimzi:strimzi to version 0.49.1-RC1 or higher.

Overview

Affected versions of this package are vulnerable to Incorrect Authorization in the process that creates Kubernetes Role bindings. An attacker can access sensitive information by executing GET requests in affected Pods using their Service Account to retrieve any Secret from the same namespace. This is only exploitable if Apache Kafka Connect or MirrorMaker 2 operands are deployed without at least one of the required TLS or authentication configurations.

References

CVSS Base Scores

version 4.0
version 3.1