CVE-2025-66623

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-66623
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-66623.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-66623
Aliases
Published
2025-12-05T18:31:30.635Z
Modified
2025-12-06T02:42:07.506179Z
Severity
  • 7.4 (High) CVSS_V3 - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N CVSS Calculator
Summary
Strimzi allows unrestricted access to all Secrets in the same Kubernetes namespace from Kafka Connect and MirrorMaker 2 operands
Details

Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations. From 0.47.0 and prior to 0.49.1, in some situations, Strimzi creates an incorrect Kubernetes Role which grants the Apache Kafka Connect and Apache Kafka MirrorMaker 2 operands the GET access to all Kubernetes Secrets that exist in the given Kubernetes namespace. The issue is fixed in Strimzi 0.49.1.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-200",
        "CWE-863"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/66xxx/CVE-2025-66623.json"
}
References

Affected packages

Git / github.com/strimzi/strimzi-kafka-operator

Affected ranges

Type
GIT
Repo
https://github.com/strimzi/strimzi-kafka-operator
Events
Database specific
{
    "versions": [
        {
            "introduced": "0.47.0"
        },
        {
            "fixed": "0.49.1"
        }
    ]
}