Impact
The NetworkClient component in Apache Kafka and its client library logs complete request and response bodies when the DEBUG log level is enabled. Because DEBUG is not the default level, a user who enables debugging can inadvertently expose highly sensitive data such as credentials, tokens, or configuration changes to anyone with access to the log files. This flaw is documented as a CWE‑533 Information Exposure flaw and does not involve code execution or denial of service. The vulnerability would allow an attacker to read private data only if they can access the logs or influence the logging configuration.
Affected Systems
Apache Kafka and Apache Kafka Clients from any supported version through v3.9.1 and v4.0.0 are affected. The upgrade advisories recommend moving to v3.9.2 or v4.0.1 and newer releases.
Risk and Exploitability
The exploitability of this issue requires the attacker to enable the DEBUG log level or otherwise modify the Kafka logging configuration. The EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog. While the CVSS score is 5.3, the risk is primarily the accidental disclosure of sensitive data rather than direct exploitation of the system. The potential impact is limited to confidentiality of information exposed in logs when DEBUG is enabled.
OpenCVE Enrichment