Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-42316— KQL injection via kusto.tables.topics.mapping in kafka-sink-azure-kusto

CVSS 5.9 · Medium EPSS 0.02% · P7

Affected Version Matrix 1

VendorProductVersion RangeStatus
Azurekafka-sink-azure-kusto< 5.2.3affected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-42316

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
KQL injection via kusto.tables.topics.mapping in kafka-sink-azure-kusto
Source: NVD (National Vulnerability Database)
Vulnerability Description
kafka-sink-azure-kusto Kafka Connect plugin is the official Microsoft sink for Azure Data Explorer (Kusto). Prior to 5.2.3, kafka-sink-azure-kusto did not sanitize user-controlled values inside the kusto.tables.topics.mapping configuration. The db, table, mapping, and format fields of each mapping entry were interpolated directly into KQL management/query commands via String.formatted(...) (e.g., FETCH_TABLE_COMMAND.formatted(table) → "<table> | count", FETCH_TABLE_MAPPING_COMMAND.formatted(table, format, mapping) → ".show table <table> ingestion <format> mapping '<mapping>'"). An actor able to influence the connector configuration (for example, someone with permissions to submit or edit Kafka Connect connector configs) could embed KQL metacharacters (;, |, ') to execute arbitrary management commands in the context of the connector's service principal — enabling schema enumeration/modification, ingestion-mapping tampering, or changes to streaming/retention policies on the target Azure Data Explorer database. This is a tampering vulnerability. Exploitation requires privileged access to the connector configuration; no end-user interaction or Kafka record payload is involved. This vulnerability is fixed in 5.2.3.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
Source: NVD (National Vulnerability Database)
Vulnerability Type
数据查询逻辑中特殊元素的不当中和
Source: NVD (National Vulnerability Database)
Vulnerability Title
Microsoft Azure Data Explorer Kafka Connect Kusto Sink Connector 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Microsoft Azure Data Explorer Kafka Connect Kusto Sink Connector是Microsoft开源的一个Kafka数据到Azure大数据分析数据库的同步连接器。 Microsoft Azure Data Explorer Kafka Connect Kusto Sink Connector 5.2.3之前版本存在安全漏洞,该漏洞源于kusto.tables.topics.mapping配置中用户控制的值未经清理,可能导致能够影响连接器配置的攻击者嵌入K
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Azurekafka-sink-azure-kusto < 5.2.3 -

II. Public POCs for CVE-2026-42316

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-42316

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2026-42316

No comments yet


Leave a comment