Vulnerability Description
kafka-sink-azure-kusto Kafka Connect plugin is the official Microsoft sink for Azure Data Explorer (Kusto). Prior to 5.2.3, kafka-sink-azure-kusto did not sanitize user-controlled values inside the kusto.tables.topics.mapping configuration. The db, table, mapping, and format fields of each mapping entry were interpolated directly into KQL management/query commands via String.formatted(...) (e.g., FETCH_TABLE_COMMAND.formatted(table) → "<table> | count", FETCH_TABLE_MAPPING_COMMAND.formatted(table, format, mapping) → ".show table <table> ingestion <format> mapping '<mapping>'"). An actor able to influence the connector configuration (for example, someone with permissions to submit or edit Kafka Connect connector configs) could embed KQL metacharacters (;, |, ') to execute arbitrary management commands in the context of the connector's service principal — enabling schema enumeration/modification, ingestion-mapping tampering, or changes to streaming/retention policies on the target Azure Data Explorer database. This is a tampering vulnerability. Exploitation requires privileged access to the connector configuration; no end-user interaction or Kafka record payload is involved. This vulnerability is fixed in 5.2.3.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/Azure/kafka-sink-azure-kusto/pull/155
- https://github.com/Azure/kafka-sink-azure-kusto/releases/tag/v5.2.3
- https://github.com/Azure/kafka-sink-azure-kusto/security/advisories/GHSA-c9mr-mq
FAQ
What is CVE-2026-42316?
CVE-2026-42316 is a vulnerability with a CVSS score of 6.5 (MEDIUM). kafka-sink-azure-kusto Kafka Connect plugin is the official Microsoft sink for Azure Data Explorer (Kusto). Prior to 5.2.3, kafka-sink-azure-kusto did not sanitize user-controlled values inside the ku...
How severe is CVE-2026-42316?
CVE-2026-42316 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-42316?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.