Summary

Vulnerability NameApache Kafka Connect Arbitrary File Read (CVE-2025-27817)
Released onJune 10, 2025
Affected ComponentApache Kafka
Affected Version3.1.0 ≤ Apache Kafka < 3.9.1
Vulnerability TypeArbitrary file read
Exploitation Condition
  1. User authentication: not required.
  2. Precondition: default configurations.
  3. Trigger mode: remote.
Impact

Exploitation difficulty: easy. Attackers can exploit this vulnerability to read arbitrary files without authorization.

Severity: high-risk. This vulnerability may result in sensitive information leakage.

Official SolutionAvailable

About the Vulnerability

Component Introduction

Apache Kafka is an open-source distributed event streaming platform used by thousands of companies for high-performance data pipelines, streaming analytics, data integration, and mission-critical applications.

Vulnerability Description

On June 10, 2025, Sangfor FarSight Labs received notification of the arbitrary file read vulnerability in Apache Kafka Connect (CVE-2025-27817), classified as high-risk in threat level.

Specifically, Apache Kafka Connect contains an arbitrary file read vulnerability that allows unauthorized attackers to read arbitrary files, potentially leading to sensitive information leakage.

Affected Versions

The following Apache Kafka versions are affected:

3.1.0 ≤ Apache Kafka < 3.9.1

Solutions

Remediation Solutions

Official Solution

The latest version has been officially released to fix the vulnerability. Affected users are advised to update Apache Kafka to 3.9.1 or a later version as needed.

Download link: https://github.com/apache/kafka/tags

Temporary Solution

It is advised not to expose Apache Kafka Connect to the public network on the premise that business operations are not affected. Detailed configurations are as follows:

If Apache Kafka Connect is started in standalone mode, set the listeners or rest.host.name field in the connect-standalone.properties configuration file to the local loopback address.

If Apache Kafka Connect is started in distributed mode, set the listeners or rest.host.name field in the connect-distributed.properties configuration file to the local loopback address

Sangfor Solutions

Risky Asset Discovery

The following Sangfor product can conduct proactive detection on Apache Kafka to discover affected assets in batches in business scenarios:

Sangfor Endpoint Secure: The corresponding asset discovery solution has been released. The fingerprint ID is 0006168.

Timeline

On June 10, 2025, Sangfor FarSight Labs received notification of the arbitrary file read vulnerability in Apache Kafka Connect (CVE-2025-27817)).

On June 10, 2025, Sangfor FarSight Labs released a vulnerability alert.

References

https://lists.apache.org/thread/6cm2d0q5126lp7w591wt19211s5xxcsm

Learn More

Sangfor FarSight Labs researches the latest cyber threats and unknown zero-day vulnerabilities, alerting customers to potential dangers to their organizations, and providing real-time solutions with actionable intelligence. Sangfor FarSight Labs works with other security vendors and the security community at large to identify and verify global cyber threats, providing fast and easy protection for customers.

Listen To This Post

Search

Get in Touch

Get in Touch with Sangfor Team for Business Inquiry

Name
Email Address
Business Phone Number
Tell us about your project requirements

Related Articles

Roundup of Microsoft Patch Tuesday (June 2025)

Date : 13 Jun 2025
Read Now

CVE-2025-5419: Out-of-Bounds Read/Write Vulnerability in V8 in Google Chrome

Date : 03 Jun 2025
Read Now

CVE-2025-41225: VMware vCenter Server Authenticated Command-Execution Vulnerability

Date : 26 May 2025
Read Now

See Other Product

Cyber Command - NDR Platform
Endpoint Secure
Sangfor Athena SWG - Secure Web Gateway
Sangfor Network Secure - Next Generation Firewall
Platform-X
Sangfor Access Secure - A SASE Solution