Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Apache Software Foundation | Apache Kafka Client | 3.1.0 ~ 3.9.0 | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E4%B8%AD%E9%97%B4%E4%BB%B6%E6%BC%8F%E6%B4%9E/Apache%20Kafka%20Clients%20%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E8%AF%BB%E5%8F%96%E4%B8%8ESSRF%20%E6%BC%8F%E6%B4%9E%20CVE-2025-27817.md | POC Details |
| 2 | CVE-2025-27817 | https://github.com/kk12-30/CVE-2025-27817 | POC Details |
| 3 | Apache Kafka客户端未对用户输入进行严格验证和限制,未经身份验证的攻击者可通过构造恶意配置读取环境变量或磁盘任意内容,或向非预期位置发送请求,提升REST API的文件系统/环境/URL访问权限。 | https://github.com/iSee857/CVE-2025-27817 | POC Details |
| 4 | Apache Kafka 4.1.0 (KRaft) with Keycloak OAuth2 authentication using Strimzi - bypasses CVE-2025-27817 URL allowlist restriction | https://github.com/oriolrius/kafka-keycloak-oauth | POC Details |
| 5 | Apache Kafka Client contains arbitrary file read and server-side request forgery caused by untrusted configuration of sasl.oauthbearer.token.endpoint.url and sasl.oauthbearer.jwks.endpoint.url, letting attackers read files or send requests to unintended locations, exploit requires untrusted party to specify client configurations. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2025/CVE-2025-27817.yaml | POC Details |
No public POC found.
Login to generate AI POC| CVE-2025-30675 | 4.7 MEDIUM | Apache CloudStack: Unauthorised template/ISO list access to the domain/resource admins |
| CVE-2025-27818 | Apache Kafka: Possible RCE attack via SASL JAAS LdapLoginModule configuration | |
| CVE-2025-27819 | Apache Kafka: Possible RCE/Denial of service attack via SASL JAAS JndiLoginModule configur | |
| CVE-2025-47713 | Apache CloudStack: Domain Admin can reset Admin password in Root Domain | |
| CVE-2025-47849 | Apache CloudStack: Insecure access of user's API/Secret Keys in the same domain | |
| CVE-2025-26521 | Apache CloudStack: CKS cluster in project exposes user API keys | |
| CVE-2025-22829 | Apache CloudStack: Unauthorised access to dedicated resources in Quota plugin |
No comments yet