A critical security flaw in Apache Camel’s header validation mechanism allows attackers to execute arbitrary system commands by exploiting case-sensitive header injection. A POC released for CVE-2025-27636, this vulnerability impacts Apache Camel versions 4.10.0-4.10.1, 4.8.0-4.8.4, and 3.10.0-3.22.3, exposing systems using vulnerable Exec component configurations to remote code execution (RCE). Organizations using Camel for enterprise integration patterns should conduct immediate audits of all HTTP-exposed Camel routes and implement protocol-level validation controls. Cyber Security News is a Dedicated News Platform For Cyber News, Cyber Attack News, Hacking News & Vulnerability Analysis. Cybersecurity firm RedHunt Labs observed active exploitation in cloud-native environments, particularly targeting Kubernetes clusters using Camel for service orchestration. This case-sensitive bypass affects all Camel components that dynamically process headers, making other endpoints beyond Exec potentially vulnerable. This allows malicious actors to replace statically defined commands in Camel routes with arbitrary executables. Kaaviya is a Security Editor and fellow reporter with Cyber Security News. However, the flawed header validation enables attackers to override this command via crafted HTTP requests. Apache Camel has addressed this in versions 4.10.2, 4.8.5, and 3.22.4 through improved case-insensitive header filtering.
This Cyber News was published on cybersecuritynews.com. Publication date: Wed, 12 Mar 2025 06:50:37 +0000