🔐 CVE Alert

CVE-2026-33557

CRITICAL 9.1

Apache Kafka: Missing JWT token validation in OAUTHBEARER authentication

CVSS Score
9.1
EPSS Score
0.0%
EPSS Percentile
0th

A possible security vulnerability has been identified in Apache Kafka. By default, the broker property `sasl.oauthbearer.jwt.validator.class` is set to `org.apache.kafka.common.security.oauthbearer.DefaultJwtValidator`. It accepts any JWT token without validating its signature, issuer, or audience. An attacker can generate a JWT token from any issuer with the `preferred_username` set to any user, and the broker will accept it. We advise the Kafka users using kafka v4.1.0 or v4.1.1 to set the config `sasl.oauthbearer.jwt.validator.class` to `org.apache.kafka.common.security.oauthbearer.BrokerJwtValidator` explicitly to avoid this vulnerability. Since Kafka v4.1.2 and v4.2.0 and later, the issue is fixed and will correctly validate the JWT token.

CWE CWE-1285
Vendor apache software foundation
Product apache kafka
Published Apr 20, 2026
Last Updated Apr 20, 2026
Stay Ahead of the Next One

Get instant alerts for apache software foundation apache kafka

Be the first to know when new critical vulnerabilities affecting apache software foundation apache kafka are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

Apache Software Foundation / Apache Kafka
4.1.0 ≤ 4.1.1

References

NVD ↗ CVE.org ↗ EPSS Data ↗
kafka.apache.org: https://kafka.apache.org/cve-list lists.apache.org: https://lists.apache.org/thread/v57o00hm6yszdpdnvqx2ss4561yh953h openwall.com: http://www.openwall.com/lists/oss-security/2026/04/17/2

Credits

Павел Романов <[email protected]>