Server-side Request Forgery (SSRF) Affecting org.apache.kafka:kafka-clients package, versions [3.1.0,3.9.1)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (8th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Server-side Request Forgery (SSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHEKAFKA-10336719
  • published11 Jun 2025
  • disclosed10 Jun 2025
  • credit4ra1n, luelueking, enokiy

Introduced: 10 Jun 2025

NewCVE-2025-27817  (opens in a new tab)
CWE-918  (opens in a new tab)

How to fix?

Upgrade org.apache.kafka:kafka-clients to version 3.9.1 or higher.

Overview

org.apache.kafka:kafka-clients is a streaming platform that can publish and subscribe to streams of records, store streams of records in a fault-tolerant durable way, and process streams of records as they occur.

Affected versions of this package are vulnerable to Server-side Request Forgery (SSRF) due to the improper handling of sasl.oauthbearer.token.endpoint.url and sasl.oauthbearer.jwks.endpoint.url configurations. An attacker can read arbitrary contents of the disk and environment variables or make requests to an unintended location by manipulating these configurations.

Note: This is only exploitable if configurations can be specified by an untrusted party.

CVSS Base Scores

version 4.0
version 3.1