Vulnerability Overview Kafka-ui contains an unauthenticated remote code execution vulnerability. The endpoint processes the parameter without performing authentication, role verification, or feature toggle checks, directly executing arbitrary Groovy code passed by users. This allows attackers to execute arbitrary operating system commands on the target server. Affected Scope All versions of Kafka-ui (under default configuration or configuration) Attackers can exploit this without any credentials Can lead to: sensitive information disclosure, data exfiltration, internal network lateral movement, persistent backdoors Remediation Add call in Remove hardcoding in within , add validation Implement sandbox isolation for Groovy script execution environment in POC Code Verification Response: