Staging Environment: Content and features may be unstable or change without notice.
Search for packages
Package details: pkg:maven/org.apache.kafka/kafka@2.8.0
purl pkg:maven/org.apache.kafka/kafka@2.8.0
Next non-vulnerable version 2.8.2
Latest non-vulnerable version 3.9.1
Risk 4.5
Vulnerabilities affecting this package (3)
Vulnerability Summary Fixed by
VCID-3jvm-ph93-bfch
Aliases:
CVE-2021-38153
GHSA-3j6g-hxx5-3q26
Information Exposure Through Discrepancy Some components in Apache Kafka use `Arrays.equals` to validate a password or key, which is vulnerable to timing attacks that make brute force attacks for such credentials more likely to be successful. There are no reported fixed by versions.
VCID-fcsz-ec5x-3kgc
Aliases:
CVE-2022-34917
GHSA-c9h3-c6qj-hh7q
Apache Kafka vulnerability can lead to brokers hitting OutOfMemoryException, causing Denial of Service A security vulnerability has been identified in Apache Kafka. It affects all releases since 2.8.0. The vulnerability allows malicious unauthenticated clients to allocate large amounts of memory on brokers. This can lead to brokers hitting OutOfMemoryException and causing denial of service. Example scenarios: - Kafka cluster without authentication: Any clients able to establish a network connection to a broker can trigger the issue. - Kafka cluster with SASL authentication: Any clients able to establish a network connection to a broker, without the need for valid SASL credentials, can trigger the issue. - Kafka cluster with TLS authentication: Only clients able to successfully authenticate via TLS can trigger the issue. We advise the users to upgrade the Kafka installations to one of the 3.2.3, 3.1.2, 3.0.2, 2.8.2 versions.
2.8.2
Affected by 0 other vulnerabilities.
3.0.2
Affected by 0 other vulnerabilities.
3.1.2
Affected by 0 other vulnerabilities.
3.2.3
Affected by 0 other vulnerabilities.
VCID-m3g5-ua28-afd2
Aliases:
CVE-2021-26291
GHSA-2f88-5hg8-9x2x
Origin Validation Error in Apache Maven Apache Maven will follow repositories that are defined in a dependency’s Project Object Model (pom) which may be surprising to some users, resulting in potential risk if a malicious actor takes over that repository or is able to insert themselves into a position to pretend to be that repository. Maven is changing the default behavior in 3.8.1+ to no longer follow http (non-SSL) repository references by default. More details available in the referenced urls. If you are currently using a repository manager to govern the repositories used by your builds, you are unaffected by the risks present in the legacy behavior, and are unaffected by this vulnerability and change to default behavior. See this link for more information about repository management: https://maven.apache.org/repository-management.html There are no reported fixed by versions.
Vulnerabilities fixed by this package (0)
Vulnerability Summary Aliases
This package is not known to fix vulnerabilities.

Date Actor Action Vulnerability Source VulnerableCode Version
2026-04-03T21:27:50.109598+00:00 GitLab Importer Affected by VCID-fcsz-ec5x-3kgc https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.kafka/kafka/CVE-2022-34917.yml 38.1.0
2026-04-02T12:38:17.549846+00:00 GitLab Importer Affected by VCID-m3g5-ua28-afd2 https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.kafka/kafka/CVE-2021-26291.yml 38.0.0
2026-04-01T16:03:29.137101+00:00 GHSA Importer Affected by VCID-fcsz-ec5x-3kgc https://github.com/advisories/GHSA-c9h3-c6qj-hh7q 38.0.0
2026-04-01T12:48:52.266746+00:00 GitLab Importer Affected by VCID-3jvm-ph93-bfch https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.kafka/kafka/CVE-2021-38153.yml 38.0.0