CVE-2025-66623

Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations. From 0.47.0 and prior to 0.49.1, in some situations, Strimzi creates an incorrect Kubernetes Role which grants the Apache Kafka Connect and Apache Kafka MirrorMaker 2 operands the GET access to all Kubernetes Secrets that exist in the given Kubernetes namespace. The issue is fixed in Strimzi 0.49.1.
Configurations

Configuration 1 (hide)

cpe:2.3:a:linuxfoundation:strimzi:*:*:*:*:*:*:*:*

History

04 Mar 2026, 20:32

Type Values Removed Values Added
References () https://github.com/strimzi/strimzi-kafka-operator/commit/c8a14935e99c91eb0dd865431f46515da9f82ccc - () https://github.com/strimzi/strimzi-kafka-operator/commit/c8a14935e99c91eb0dd865431f46515da9f82ccc - Patch
References () https://github.com/strimzi/strimzi-kafka-operator/security/advisories/GHSA-xrhh-hx36-485q - () https://github.com/strimzi/strimzi-kafka-operator/security/advisories/GHSA-xrhh-hx36-485q - Vendor Advisory
CPE cpe:2.3:a:linuxfoundation:strimzi:*:*:*:*:*:*:*:*
First Time Linuxfoundation
Linuxfoundation strimzi

05 Dec 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-12-05 19:15

Updated : 2026-03-04 20:32


NVD link : CVE-2025-66623

Mitre link : CVE-2025-66623

CVE.ORG link : CVE-2025-66623


JSON object : View

Products Affected

linuxfoundation

  • strimzi
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-863

Incorrect Authorization