CVE-2026-33558
Received Received - Intake
Information Exposure in Apache Kafka NetworkClient DEBUG Logs

Publication date: 2026-04-20

Last updated on: 2026-04-22

Assigner: Apache Software Foundation

Description
Information exposure vulnerability has been identified in Apache Kafka. The NetworkClient component will output entire requests and responses information in the DEBUG log level in the logs. By default, the log level is set to INFO level. If the DEBUG level is enabled, the sensitive information will be exposed via the requests and responses output log. The entire lists of impacted requests and responses are: * AlterConfigsRequest * AlterUserScramCredentialsRequest * ExpireDelegationTokenRequest * IncrementalAlterConfigsRequest * RenewDelegationTokenRequest * SaslAuthenticateRequest * createDelegationTokenResponse * describeDelegationTokenResponse * SaslAuthenticateResponse This issue affects Apache Kafka: from any version supported the listed API above through v3.9.1, v4.0.0. We advise the Kafka users to upgrade to v3.9.2, v4.0.1, or later to avoid this vulnerability.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-20
Last Modified
2026-04-22
Generated
2026-05-07
AI Q&A
2026-04-20
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 5 associated CPEs
Vendor Product Version / Range
apache kafka From 0.11.0.0 (inc) to 3.9.2 (exc)
apache kafka 4.0.0
apache kafka 4.0.0
apache kafka 4.0.0
apache kafka 4.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-533 This entry has been deprecated because its abstraction was too low-level. See CWE-532.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-33558 is an information exposure vulnerability in Apache Kafka and its clients. It occurs because the NetworkClient component outputs entire request and response data when the logging level is set to DEBUG. By default, the log level is INFO, so this sensitive information is not exposed unless DEBUG logging is enabled.

The vulnerability affects several specific API requests and responses, including AlterConfigsRequest, AlterUserScramCredentialsRequest, ExpireDelegationTokenRequest, IncrementalAlterConfigsRequest, RenewDelegationTokenRequest, SaslAuthenticateRequest, createDelegationTokenResponse, describeDelegationTokenResponse, and SaslAuthenticateResponse.

If DEBUG logging is enabled, sensitive information contained in these requests and responses can be exposed in the logs.


How can this vulnerability impact me? :

If DEBUG logging is enabled in Apache Kafka, sensitive information from certain requests and responses can be exposed in the logs. This can lead to unauthorized disclosure of sensitive data, potentially compromising security.

Such exposure could allow attackers or unauthorized users with access to the logs to obtain confidential information, which might include authentication credentials or configuration details.

To mitigate this risk, users should avoid enabling DEBUG logging in production environments or upgrade to Apache Kafka versions 3.9.2, 4.0.1, or later where this issue is fixed.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by checking if the Apache Kafka NetworkClient component is logging at the DEBUG level, which exposes entire requests and responses containing sensitive information.

To detect this on your system, you can inspect the Kafka log files for DEBUG level entries that include detailed request and response data, especially for the affected API calls such as AlterConfigsRequest, SaslAuthenticateRequest, and others.

Suggested commands include using grep or similar tools to search Kafka log files for DEBUG entries related to these requests. For example:

  • grep -i 'DEBUG' /path/to/kafka/logs/server.log | grep -E 'AlterConfigsRequest|SaslAuthenticateRequest|ExpireDelegationTokenRequest'
  • tail -f /path/to/kafka/logs/server.log | grep 'DEBUG'

If DEBUG logs contain full request and response data, the vulnerability is present.


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to ensure that the Kafka logging level is not set to DEBUG, as DEBUG logging exposes sensitive information in the logs.

Additionally, users should upgrade Apache Kafka to version 3.9.2, 4.0.1, or later, where this vulnerability has been fixed.

Until the upgrade can be performed, verify and configure the logging settings to use INFO or higher log levels to prevent sensitive data exposure.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability causes sensitive information to be exposed in logs when the DEBUG log level is enabled in Apache Kafka's NetworkClient component.

Exposure of sensitive information through logs can lead to non-compliance with data protection regulations such as GDPR and HIPAA, which require protection of personal and sensitive data from unauthorized access or disclosure.

Therefore, if DEBUG logging is enabled in affected versions, organizations using Apache Kafka may risk violating these standards due to unintended information exposure.

Upgrading to fixed versions (3.9.2, 4.0.1, or later) is advised to mitigate this risk and help maintain compliance.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart