icon

We found results for “

CVE-2025-27636

Good to know:

icon
icon

Date: March 9, 2025

Bypass/Injection vulnerability in Apache Camel. This issue affects Apache Camel: from 4.10.0 through <= 4.10.1, from 4.8.0 through <= 4.8.4, from 3.10.0 through <= 3.22.3. Users are recommended to upgrade to version 4.10.2 for 4.10.x LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases. The vulnerability arises due to a bug in the default filtering mechanism that only blocks headers starting with "Camel", "camel", or "org.apache.camel.". Attackers can bypass this filter by altering the casing of letters. This allows attackers to inject headers which can be exploited to invoke arbitrary methods from the Bean registry and also supports using Simple Expression Language (or OGNL in some cases) as part of the method parameters passed to the bean. It's important to note that only methods in the same bean declared in the bean URI could be invoked. Mitigation: You can easily work around this in your Camel applications by removing the headers in your Camel routes. There are many ways of doing this, also globally or per route. This means you could use the removeHeaders EIP, to filter out anything like "cAmel, cAMEL" etc, or in general everything not starting with "Camel", "camel" or "org.apache.camel.".

Severity Score

Severity Score

Weakness Type (CWE)

Improper Handling of Case Sensitivity

CWE-178

Top Fix

icon

Upgrade Version

Upgrade to version org.apache.camel:camel-support:4.10.2;org.apache.camel:camel-support:4.8.5;org.apache.camel:camel-support:3.22.4;org.apache.camel:camel-support:4.10.1;org.apache.camel:camel-support:3.22.4;org.apache.camel:camel-support:4.8.4;org.apache.camel:camel-support:4.8.4;https://github.com/apache/camel.git - camel-3.22.4;https://github.com/apache/camel.git - camel-4.8.5;https://github.com/apache/camel.git - camel-4.10.2

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): HIGH
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): LOW
Integrity (I): HIGH
Availability (A): NONE

Do you need more information?

Contact Us