CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-27636: Apache Camel: Camel Message Header Injection via Improper Filtering

Description

Bypass/Injection vulnerability in Apache Camel.

This issue affects Apache Camel: from 4.10.0 through <= 4.10.1, from 4.8.0 through <= 4.8.4, from 3.10.0 through <= 3.22.3.

Users are recommended to upgrade to version 4.10.2 for 4.10.x LTS, 4.8.5 for 4.8.x LTS and 3.22.4 for 3.x releases.

The vulnerability arises due to a bug in the default filtering mechanism that only blocks headers starting with "Camel", "camel", or "org.apache.camel.". Attackers can bypass this filter by altering the casing of letters. This allows attackers to inject headers which can be exploited to invoke arbitrary methods from the Bean registry and also supports using Simple Expression Language (or OGNL in some cases) as part of the method parameters passed to the bean. It's important to note that only methods in the same bean declared in the bean URI could be invoked.

Mitigation: You can easily work around this in your Camel applications by removing the headers in your Camel routes. There are many ways of doing this, also globally or per route. This means you could use the removeHeaders EIP, to filter out anything like "cAmel, cAMEL" etc, or in general everything not starting with "Camel", "camel" or "org.apache.camel.".

Classification

CVE ID: CVE-2025-27636

Problem Types

Bypass/Injection

Affected Products

Vendor: Apache Software Foundation

Product: Apache Camel

Exploit Prediction Scoring System (EPSS)

EPSS Score: 20.46% (probability of being exploited)

EPSS Percentile: 95.08% (scored less or equal to compared to others)

EPSS Date: 2025-04-07 (when was this score calculated)

References

https://nvd.nist.gov/vuln/detail/CVE-2025-27636
https://lists.apache.org/thread/l3zcg3vts88bmc7w8172wkgw610y693z

Timeline