CVE-2023-52251
HIGH EXPLOITED NUCLEIKafka UI Unauthenticated Remote Command Execution via the Groovy Filter option.
Title source: metasploitDescription
An issue discovered in provectus kafka-ui 0.4.0 through 0.7.1 allows remote attackers to execute arbitrary code via the q parameter of /api/clusters/local/topics/{topic}/messages.
Exploits (2)
nomisec
WORKING POC
20 stars
by BobTheShoplifter · remote
https://github.com/BobTheShoplifter/CVE-2023-52251-POC
metasploit
WORKING POC
EXCELLENT
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/kafka_ui_unauth_rce_cve_2023_52251.rb
Nuclei Templates (1)
Kafka UI 0.7.1 Command Injection
HIGHVERIFIEDby yhy0,iamnoooob
FOFA:
icon_hash="-1477045616"
Scores
CVSS v3
8.8
EPSS
0.9357
EPSS Percentile
99.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
VulnCheck KEV
2025-12-02
CWE
CWE-94
Status
published
Products (1)
provectus/ui
0.4.0 - 0.7.1
Published
Jan 25, 2024
Tracked Since
Feb 18, 2026