PT-2025-10464 · Apache · Apache Camel

Mark Thorson

·

Published

2025-03-09

·

Updated

2025-07-15

·

CVE-2025-27636

CVSS v4.0
6.3
VectorAV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

**Name of the Vulnerable Software and Affected Versions:**

Apache Camel versions 3.10.0 through 3.22.3, 4.8.0 through 4.8.5, and 4.10.0 through 4.10.2.

**Description:**

A bypass/injection vulnerability exists in Apache Camel due to insufficient filtering of incoming headers. This flaw allows attackers to inject custom headers, potentially altering the behavior of Camel components such as `camel-bean` and `camel-exec`. Specifically, malicious headers can be used to invoke unintended methods or redirect messages to different destinations. The vulnerability stems from a default filtering mechanism that only blocks headers starting with "Camel", "camel", or "org.apache.camel.", while not accounting for case sensitivity or parameters within HTTP requests. Active exploitation has been observed, with over 126,000 exploitation attempts blocked by Palo Alto Networks in March.

**Recommendations:**

Apache Camel versions prior to 3.22.4 are vulnerable.

Apache Camel versions prior to 4.8.5 are vulnerable.

Apache Camel versions prior to 4.10.3 are vulnerable.

As a workaround, remove headers in your Camel routes using the `removeHeaders` EIP to filter out any headers not starting with "Camel", "camel", or "org.apache.camel.".

Exploit

Fix

RCE

Weakness Enumeration

Related Identifiers

BDU:2025-02723
BDU:2025-03703
CVE-2025-27636
GHSA-2C2H-2855-MF97
GHSA-96V5-C2H5-56HM
GHSA-VQ4P-PCHP-6G6V

Affected Products

Apache Camel