๐Ÿ” CVE Alert

CVE-2026-33558

MEDIUM 5.3

Apache Kafka, Apache Kafka Clients: Information Exposure Through Network Client Log Output

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

Information exposure vulnerability has been identified in Apache Kafka. The NetworkClient component will output entire requests and responses information in the DEBUG log level in the logs. By default, the log level is set to INFO level. If the DEBUG level is enabled, the sensitive information will be exposed via the requests and responses output log. The entire lists of impacted requests and responses are: * AlterConfigsRequest * AlterUserScramCredentialsRequest * ExpireDelegationTokenRequest * IncrementalAlterConfigsRequest * RenewDelegationTokenRequest * SaslAuthenticateRequest * createDelegationTokenResponse * describeDelegationTokenResponse * SaslAuthenticateResponse This issue affects Apache Kafka: from any version supported the listed API above through v3.9.1, v4.0.0. We advise the Kafka users to upgrade to v3.9.2, v4.0.1, or later to avoid this vulnerability.

CWE CWE-533
Vendor apache software foundation
Product apache kafka
Published Apr 20, 2026
Last Updated Apr 20, 2026
Stay Ahead of the Next One

Get instant alerts for apache software foundation apache kafka

Be the first to know when new medium vulnerabilities affecting apache software foundation apache kafka are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

Apache Software Foundation / Apache Kafka
0.11.0 โ‰ค 3.9.1 4.0.0
Apache Software Foundation / Apache Kafka Clients
0.11.0 โ‰ค 3.9.1 4.0.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
kafka.apache.org: https://kafka.apache.org/cve-list lists.apache.org: https://lists.apache.org/thread/pz5g4ky3h0k91tfd14p0dzqjp80960kl openwall.com: http://www.openwall.com/lists/oss-security/2026/04/17/3

Credits

Alyssa Huang <[email protected]> Luke Chen <[email protected]>