CVE-2026-42316
KQL injection via kusto.tables.topics.mapping in kafka-sink-azure-kusto
kafka-sink-azure-kusto Kafka Connect plugin is the official Microsoft sink for Azure Data Explorer (Kusto). Prior to 5.2.3, kafka-sink-azure-kusto did not sanitize user-controlled values inside the kusto.tables.topics.mapping configuration. The db, table, mapping, and format fields of each mapping entry were interpolated directly into KQL management/query commands via String.formatted(...) (e.g., FETCH_TABLE_COMMAND.formatted(table) โ "<table> | count", FETCH_TABLE_MAPPING_COMMAND.formatted(table, format, mapping) โ ".show table <table> ingestion <format> mapping '<mapping>'"). An actor able to influence the connector configuration (for example, someone with permissions to submit or edit Kafka Connect connector configs) could embed KQL metacharacters (;, |, ') to execute arbitrary management commands in the context of the connector's service principal โ enabling schema enumeration/modification, ingestion-mapping tampering, or changes to streaming/retention policies on the target Azure Data Explorer database. This is a tampering vulnerability. Exploitation requires privileged access to the connector configuration; no end-user interaction or Kafka record payload is involved. This vulnerability is fixed in 5.2.3.
| CWE | CWE-943 |
| Vendor | azure |
| Product | kafka-sink-azure-kusto |
| Published | May 11, 2026 |
| Last Updated | May 11, 2026 |
Get instant alerts for azure kafka-sink-azure-kusto
Be the first to know when new medium vulnerabilities affecting azure kafka-sink-azure-kusto are published โ delivered to Slack, Telegram or Discord.
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N/E:P/RL:O/RC:C