top of page
perceptive_background_267k.jpg

The fix for CVE-2025-27636 added setLowerCase(true) to HttpHeaderFilterStrategy so that case-variant header names such as 'CAmelExecCommandExecutable' are filte…

Published:

26 april 2026 om 22:00:00

Alert date:

27 april 2026 om 19:18:12

Source:

nvd.nist.gov

Click to open the original link from this advisory

Enterprise Applications, Web Technologies

CVE-2026-40453 affects Apache Camel versions 3.0.0-4.14.6, 4.15.0-4.18.2, and 4.19.0-4.20.0. The vulnerability stems from incomplete fixes for CVE-2025-27636, where setLowerCase(true) was not applied to five non-HTTP HeaderFilterStrategy implementations. This allows attackers with JMS producer access to inject case-variant Camel internal headers, bypassing case-sensitive filtering. The vulnerability enables remote code execution and arbitrary file writes on routes forwarding JMS messages to header-driven components like camel-exec and camel-file. Affected implementations include JmsHeaderFilterStrategy, ClassicJmsHeaderFilterStrategy, SjmsHeaderFilterStrategy, CoAPHeaderFilterStrategy, and GooglePubsubHeaderFilterStrategy. Users should upgrade to version 4.20.0, 4.14.6 for LTS users, or 4.18.2 for 4.18.x stream users.

Technical details

Mitigation steps:

Affected products:

Apache Camel

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page