Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25999: CWE-285: Improper Authorization in Aiven-Open klaw

0
High
VulnerabilityCVE-2026-25999cvecve-2026-25999cwe-285
Published: Wed Feb 11 2026 (02/11/2026, 21:00:30 UTC)
Source: CVE Database V5
Vendor/Project: Aiven-Open
Product: klaw

Description

Klaw is a self-service Apache Kafka Topic Management/Governance tool/portal. Prior to 2.10.2, there is an improper access control vulnerability that allows unauthorized users to trigger a reset or deletion of metadata for any tenant. By sending a crafted request to the /resetMemoryCache endpoint, an attacker can clear cached configurations, environments, and cluster data. This vulnerability is fixed in 2.10.2.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/19/2026, 13:54:59 UTC

Technical Analysis

CVE-2026-25999 is an improper authorization vulnerability (CWE-285) found in Aiven-Open's Klaw, an Apache Kafka topic management and governance portal. Klaw facilitates self-service Kafka topic operations across tenants. In versions prior to 2.10.2, the /resetMemoryCache REST endpoint lacks proper access control, allowing unauthorized users with some level of privileges (PR:L - low privileges) to send crafted HTTP requests that reset or delete cached metadata for any tenant. This metadata includes configurations, environment settings, and cluster data critical for Kafka governance. The vulnerability does not require user interaction (UI:N) and can be exploited remotely over the network (AV:N). The impact affects the integrity and availability of Kafka governance data, potentially causing disruption or denial of service in Kafka topic management. The CVSS v3.1 score is 7.1 (high), reflecting the ease of exploitation combined with significant impact on availability and integrity. Although no known exploits are reported in the wild, the vulnerability poses a risk in multi-tenant Kafka environments where attackers could disrupt operations or cause misconfigurations. The issue was publicly disclosed on February 11, 2026, and fixed in Klaw version 2.10.2. Organizations running affected versions should prioritize upgrading and implement strict access controls to the management endpoints to mitigate risk.

Potential Impact

The vulnerability allows unauthorized users with limited privileges to reset or delete critical Kafka governance metadata, impacting the integrity and availability of Kafka topic management. This can lead to disruption of Kafka operations, misconfiguration, or denial of service for tenants relying on Klaw for topic governance. In multi-tenant environments, attackers could target other tenants' configurations, causing cross-tenant impact and operational outages. The loss or reset of cached configurations and cluster data may require manual recovery, increasing operational overhead and risk of errors. Organizations relying on Klaw for Kafka governance may experience degraded service reliability and potential data governance issues. The vulnerability could also be leveraged as part of a broader attack chain to disrupt data pipelines or cloud services dependent on Kafka. Although exploitation requires some privileges, the ease of triggering the reset remotely without user interaction increases the threat level.

Mitigation Recommendations

1. Upgrade Klaw to version 2.10.2 or later, where the vulnerability is fixed. 2. Restrict network access to the /resetMemoryCache endpoint using firewall rules, API gateways, or network segmentation to limit exposure only to trusted administrators. 3. Implement strong authentication and authorization controls for all Klaw management endpoints, ensuring that only fully authorized users can perform sensitive operations. 4. Monitor and audit access logs for unusual or unauthorized requests to the /resetMemoryCache endpoint or other critical APIs. 5. Employ role-based access control (RBAC) to minimize privileges granted to users, reducing the risk of exploitation by low-privilege accounts. 6. In multi-tenant deployments, isolate tenant data and configurations as much as possible to limit cross-tenant impact. 7. Regularly back up Kafka governance metadata and configurations to enable rapid recovery in case of accidental or malicious resets. 8. Conduct security assessments and penetration tests focusing on API endpoints to detect improper authorization issues proactively.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-09T17:41:55.859Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698cf19f4b57a58fa1cc1c9a

Added to database: 2/11/2026, 9:16:15 PM

Last enriched: 2/19/2026, 1:54:59 PM

Last updated: 3/29/2026, 1:39:58 AM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses