Lookup for vulnerable packages by Package URL.

Purlpkg:maven/org.apache.kafka/kafka-clients@3.9.2
Typemaven
Namespaceorg.apache.kafka
Namekafka-clients
Version3.9.2
Qualifiers
Subpath
Is_vulnerablefalse
Next_non_vulnerable_version4.0.2
Latest_non_vulnerable_version4.1.2
Affected_by_vulnerabilities
Fixing_vulnerabilities
0
url VCID-ja6g-epa4-qbhn
vulnerability_id VCID-ja6g-epa4-qbhn
summary
A race condition in the Apache Kafka Java producer client’s buffer pool management can cause messages to be silently delivered to incorrect topics.

When a produce batch expires due to delivery.timeout.ms while a network request containing that batch is still in flight, the batch’s ByteBuffer is prematurely deallocated and returned to the buffer pool. If a subsequent producer batch—potentially destined for a different topic—reuses this freed buffer before the original network request completes, the buffer contents may become corrupted. This can result in messages being delivered to unintended topics without any error being reported to the producer.


Data Confidentiality:
Messages intended for one topic may be delivered to a different topic, potentially exposing sensitive data to consumers who have access to the destination topic but not the intended source topic.

Data Integrity:
Consumers on the receiving topic may encounter unexpected or incompatible messages, leading to deserialization failures, processing errors, and corrupted downstream data.

This issue affects Apache Kafka versions ≤ 3.9.1, ≤ 4.0.1, and  ≤ 4.1.1.

Kafka users are advised to upgrade to 3.9.2, 4.0.2, 4.1.2, 4.2.0, or later to address this vulnerability.
references
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-35554.json
reference_id
reference_type
scores
0
value 6.8
scoring_system cvssv3
scoring_elements CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2026-35554.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2026-35554
reference_id
reference_type
scores
0
value 0.00028
scoring_system epss
scoring_elements 0.07901
published_at 2026-04-12T12:55:00Z
1
value 0.00028
scoring_system epss
scoring_elements 0.07908
published_at 2026-04-08T12:55:00Z
2
value 0.00028
scoring_system epss
scoring_elements 0.07929
published_at 2026-04-09T12:55:00Z
3
value 0.00028
scoring_system epss
scoring_elements 0.07917
published_at 2026-04-11T12:55:00Z
4
value 0.00037
scoring_system epss
scoring_elements 0.10771
published_at 2026-04-16T12:55:00Z
5
value 0.00037
scoring_system epss
scoring_elements 0.10865
published_at 2026-04-24T12:55:00Z
6
value 0.00037
scoring_system epss
scoring_elements 0.10905
published_at 2026-04-21T12:55:00Z
7
value 0.00037
scoring_system epss
scoring_elements 0.10785
published_at 2026-04-18T12:55:00Z
8
value 0.00037
scoring_system epss
scoring_elements 0.10907
published_at 2026-04-13T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2026-35554
2
reference_url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
url https://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml
3
reference_url https://github.com/apache/kafka
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/kafka
4
reference_url https://github.com/apache/kafka/commit/1df2ac5b2ba4d1b5ed54b895ff6fb9539303ccb5
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/kafka/commit/1df2ac5b2ba4d1b5ed54b895ff6fb9539303ccb5
5
reference_url https://github.com/apache/kafka/pull/21065
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/kafka/pull/21065
6
reference_url https://github.com/apache/kafka/pull/21285
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/kafka/pull/21285
7
reference_url https://github.com/apache/kafka/pull/21286
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/kafka/pull/21286
8
reference_url https://github.com/apache/kafka/pull/21287
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/kafka/pull/21287
9
reference_url https://github.com/apache/kafka/pull/21288
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://github.com/apache/kafka/pull/21288
10
reference_url http://www.openwall.com/lists/oss-security/2026/04/07/6
reference_id
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url http://www.openwall.com/lists/oss-security/2026/04/07/6
11
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=2455916
reference_id 2455916
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=2455916
12
reference_url https://nvd.nist.gov/vuln/detail/CVE-2026-35554
reference_id CVE-2026-35554
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
url https://nvd.nist.gov/vuln/detail/CVE-2026-35554
13
reference_url https://lists.apache.org/thread/f07x7j8ovyqhjd1to25jsnqbm6wj01d6
reference_id f07x7j8ovyqhjd1to25jsnqbm6wj01d6
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-07T13:57:17Z/
url https://lists.apache.org/thread/f07x7j8ovyqhjd1to25jsnqbm6wj01d6
14
reference_url https://github.com/advisories/GHSA-5qcv-4rpc-jp93
reference_id GHSA-5qcv-4rpc-jp93
reference_type
scores
0
value HIGH
scoring_system cvssv3.1_qr
scoring_elements
url https://github.com/advisories/GHSA-5qcv-4rpc-jp93
15
reference_url https://issues.apache.org/jira/browse/KAFKA-19012
reference_id KAFKA-19012
reference_type
scores
0
value 8.7
scoring_system cvssv3.1
scoring_elements CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N
1
value HIGH
scoring_system generic_textual
scoring_elements
2
value Track
scoring_system ssvc
scoring_elements SSVCv2/E:N/A:N/T:P/P:M/B:A/M:M/D:T/2026-04-07T13:57:17Z/
url https://issues.apache.org/jira/browse/KAFKA-19012
fixed_packages
0
url pkg:maven/org.apache.kafka/kafka-clients@3.9.2
purl pkg:maven/org.apache.kafka/kafka-clients@3.9.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.kafka/kafka-clients@3.9.2
1
url pkg:maven/org.apache.kafka/kafka-clients@4.0.2
purl pkg:maven/org.apache.kafka/kafka-clients@4.0.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.kafka/kafka-clients@4.0.2
2
url pkg:maven/org.apache.kafka/kafka-clients@4.1.2
purl pkg:maven/org.apache.kafka/kafka-clients@4.1.2
is_vulnerable false
affected_by_vulnerabilities
resource_url http://public2.vulnerablecode.io/packages/pkg:maven/org.apache.kafka/kafka-clients@4.1.2
aliases CVE-2026-35554, GHSA-5qcv-4rpc-jp93
risk_score 4.0
exploitability 0.5
weighted_severity 8.0
resource_url http://public2.vulnerablecode.io/vulnerabilities/VCID-ja6g-epa4-qbhn
Risk_scorenull
Resource_urlhttp://public2.vulnerablecode.io/packages/pkg:maven/org.apache.kafka/kafka-clients@3.9.2