CVE-2026-27133

MEDIUM

Strimzi 0.47.0-0.50.1 - Auth Bypass

Title source: llm
STIX 2.1

Description

Strimzi provides a way to run an Apache Kafka cluster on Kubernetes or OpenShift in various deployment configurations. From 0.47.0 to before 0.50.1, when a chain consisting of multiple CA (Certificate Authority) certificates is used in the trusted certificates configuration of a Kafka Connect operand or of the target cluster in the Kafka MirrorMaker 2 operand, all of the certificates that are part of the CA chain will be trusted individually when connecting to the Apache Kafka cluster. Due to this error, the affected operand (Kafka Connect or Kafka MirrorMaker 2) might accept connections to Kafka brokers using server certificates signed by one of the other CAs in the CA chain and not just by the last CA in the chain. This issue is fixed in Strimzi 0.50.1.

Scores

CVSS v3 5.9
EPSS 0.0001
EPSS Percentile 1.6%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact total

Details

CWE
CWE-295 CWE-296
Status published
Products (2)
linuxfoundation/strimzi 0.47.0 - 0.50.1
linuxfoundation/strimzi_kafka_operator 0.47.0 - 0.50.1
Published Feb 20, 2026
Tracked Since Feb 21, 2026