← Retour aux CVEs
CVE-2026-25999
HIGH7.1
Description
Klaw is a self-service Apache Kafka Topic Management/Governance tool/portal. Prior to 2.10.2, there is an improper access control vulnerability that allows unauthorized users to trigger a reset or deletion of metadata for any tenant. By sending a crafted request to the /resetMemoryCache endpoint, an attacker can clear cached configurations, environments, and cluster data. This vulnerability is fixed in 2.10.2.
Details CVE
Score CVSS v3.17.1
SeveriteHIGH
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisLOW
Interaction utilisateurNONE
Publie2/11/2026
Derniere modification2/26/2026
Sourcenvd
Observations honeypot0
Produits affectes
aiven:klaw
Faiblesses (CWE)
CWE-285
References
https://github.com/Aiven-Open/klaw/commit/617ed96b1db111ed498d89132321bf39f486e3a1(security-advisories@github.com)
https://github.com/Aiven-Open/klaw/releases/tag/v2.10.2(security-advisories@github.com)
https://github.com/Aiven-Open/klaw/security/advisories/GHSA-rp26-qv9w-xr5q(security-advisories@github.com)
Correlations IOC
Aucune correlation enregistree
This product uses data from the NVD API but is not endorsed or certified by the NVD.