PT-2025-10464 · Apache · Apache Camel
Mark Thorson
·
Published
2025-03-09
·
Updated
2025-07-15
·
CVE-2025-27636
6.3
Medium
Base vector | Vector | AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N |
**Name of the Vulnerable Software and Affected Versions:**
Apache Camel versions 3.10.0 through 3.22.3, 4.8.0 through 4.8.5, and 4.10.0 through 4.10.2.
**Description:**
A bypass/injection vulnerability exists in Apache Camel due to insufficient filtering of incoming headers. This flaw allows attackers to inject custom headers, potentially altering the behavior of Camel components such as `camel-bean` and `camel-exec`. Specifically, malicious headers can be used to invoke unintended methods or redirect messages to different destinations. The vulnerability stems from a default filtering mechanism that only blocks headers starting with "Camel", "camel", or "org.apache.camel.", while not accounting for case sensitivity or parameters within HTTP requests. Active exploitation has been observed, with over 126,000 exploitation attempts blocked by Palo Alto Networks in March.
**Recommendations:**
Apache Camel versions prior to 3.22.4 are vulnerable.
Apache Camel versions prior to 4.8.5 are vulnerable.
Apache Camel versions prior to 4.10.3 are vulnerable.
As a workaround, remove headers in your Camel routes using the `removeHeaders` EIP to filter out any headers not starting with "Camel", "camel", or "org.apache.camel.".
Exploit
Fix
RCE
Related Identifiers
Affected Products
References · 85
- 🔥 https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC/blob/main/src/main/java/com/example/camel/VulnerableCamel.java⭐ 33 🔗 10 · Exploit
- 🔥 https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC⭐ 28 🔗 8 · Exploit
- 🔥 https://camel.apache.org/security/CVE-2025-27636.txt.asc · Exploit
- https://bdu.fstec.ru/vul/2025-03703 · Security Note
- https://osv.dev/vulnerability/GHSA-2c2h-2855-mf97 · Vendor Advisory
- https://lists.apache.org/thread/l3zcg3vts88bmc7w8172wkgw610y693z · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-27636 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2025-29891 · Security Note
- https://osv.dev/vulnerability/GHSA-vq4p-pchp-6g6v · Vendor Advisory
- https://bdu.fstec.ru/vul/2025-02723 · Security Note
- https://osv.dev/vulnerability/CVE-2025-27636 · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-96v5-c2h5-56hm · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2025-30177 · Security Note
- https://camel.apache.org/security/CVE-2025-27636.html · Vendor Advisory
- https://issues.apache.org/jira/browse/CAMEL-21828 · Patch