Improper Permissions in Strimzi Leading to Excessive Access to Kubernetes Secrets
CVE-2025-66623

7.4HIGH

Key Information:

Vendor

Strimzi

Vendor
CVE Published:
5 December 2025

What is CVE-2025-66623?

The Strimzi Kafka Operator, which enables the deployment of Apache Kafka clusters on Kubernetes or OpenShift, contains a vulnerability that can lead to improper access control. Specifically, in versions 0.47.0 through 0.48.0, a misconfigured Kubernetes Role may inadvertently allow Kafka Connect and MirrorMaker 2 components access to all Kubernetes Secrets within a namespace. This issue poses a significant risk as it could expose sensitive information stored in these Secrets. The vulnerability has been addressed in Strimzi version 0.49.1, where the correct Kubernetes Role permissions have been implemented.

Affected Version(s)

strimzi-kafka-operator >= 0.47.0, < 0.49.1

References

CVSS V3.1

Score:
7.4
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-66623 : Improper Permissions in Strimzi Leading to Excessive Access to Kubernetes Secrets