JustAppSec
Back to news

JWT validation bypass in Kafka OAUTHBEARER authentication fixed

1 min readPublished 17 Apr 2026Source: oss-sec (seclists.org)

TL;DR — Kafka brokers using OAUTHBEARER with the default JWT validator can accept attacker-minted JWTs without signature/issuer/audience validation, enabling straightforward user impersonation.

What happened

Apache Kafka is a distributed event-streaming platform commonly used as a shared data plane for logs, events, metrics, and application messaging.

An oss-sec disclosure for CVE-2026-33557 reports an “important” security issue in Kafka’s OAUTHBEARER authentication: by default, the broker property sasl.oauthbearer.jwt.validator.class is set to org.apache.kafka.common.security.oauthbearer.DefaultJwtValidator, which accepts any JWT token without validating its signature, issuer, or audience. The advisory states that an attacker can generate a JWT “from any issuer” with preferred_username set to an arbitrary user and the broker will accept it.

Why it matters: JWT/OIDC-based authentication is a common enterprise baseline for shared infrastructure. A “token accepted without validation” failure mode turns an identity control into a bypassable hint, and Kafka auth misconfiguration (especially via insecure defaults) has outsized blast radius in platform environments.

Who is impacted

  • Kafka deployments using OAUTHBEARER authentication where brokers rely on the default sasl.oauthbearer.jwt.validator.class behavior.
  • Affected versions (per the oss-sec disclosure):
ComponentAffected versions (per disclosure)Fixed versions (per disclosure)
Apache Kafka4.1.0 through 4.1.14.1.2, 4.2.0 and later

What to do now

  • Follow vendor remediation guidance for CVE-2026-33557.

    "We advise the Kafka users using kafka v4.1.0 or v4.1.1 to set the config sasl.oauthbearer.jwt.validator.class to org.apache.kafka.common.security.oauthbearer.BrokerJwtValidator explicitly to avoid this vulnerability. Since Kafka v4.1.2 and v4.2.0 and later, the issue is fixed and will correctly validate the JWT token."

  • Inventory Kafka clusters and broker configs to identify where OAUTHBEARER is enabled and whether sasl.oauthbearer.jwt.validator.class is explicitly set.
  • Treat unexplained authentication anomalies (unexpected principals / sudden access patterns) as potential signals; if compromise is suspected, review authentication and authorization logs around OAUTHBEARER usage and rotate credentials/secrets accessible to affected principals.

Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.