A POC released for CVE-2025-27636, this vulnerability impacts Apache Camel versions 4.10.0-4.10.1, 4.8.0-4.8.4, and 3.10.0-3.22.3, exposing systems using vulnerable Exec component configurations to remote code execution (RCE).
The vulnerability stems from improper case normalization when filtering HTTP headers in Camel’s Exec component.
While Apache Camel documentation specifies that headers like CamelExecCommandExecutable should be sanitized to prevent command override, attackers can bypass these filters using mixed-case variants such as CAmelExecCommandExecutable.
This allows malicious actors to replace statically defined commands in Camel routes with arbitrary executables.
Consider this vulnerable Camel route configuration:
Normally, the exec:whoami endpoint would execute the whoami command. However, the flawed header validation enables attackers to override this command via crafted HTTP requests.
The issue has a CVSS 9.8 (Critical) rating, indicating a low attack complexity and high exploitability.
Attackers exploit this vulnerability by sending HTTP requests with malicious headers. This executes ls instead of whoami, returning directory contents:
This executes ping -c 2 8.8.8.8, demonstrating network reconnaissance capabilities.
The vulnerability enables:
Notably, standard headers like CamelExecCommandExecutable (correctly cased) remain filtered, creating a false sense of security.
This case-sensitive bypass affects all Camel components that dynamically process headers, making other endpoints beyond Exec potentially vulnerable.
Apache Camel has addressed this in versions 4.10.2, 4.8.5, and 3.22.4 through improved case-insensitive header filtering. Administrators should:
For temporary mitigation, security teams can override the ExecBinding class to enforce case-insensitive header validation:
Cybersecurity firm RedHunt Labs observed active exploitation in cloud-native environments, particularly targeting Kubernetes clusters using Camel for service orchestration.
This vulnerability underscores the critical need for consistent case normalization in HTTP header processing—a lesson with implications beyond Apache Camel to all header-driven middleware systems.
Organizations using Camel for enterprise integration patterns should conduct immediate audits of all HTTP-exposed Camel routes and implement protocol-level validation controls.
Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.
The post Apache Camel Vulnerability Let Attackers Inject Arbitrary Headers – PoC Exploit Released appeared first on Cyber Security News.
The first full trailer for Spider-Man: Brand New Day is full of familiar faces, and…
Sony has trained a "Protective AI" model on content from Studio Ghibli films in order…
Spoilers follow for the first three episodes of Prime Video’s Invincible Season 4, which debuts…
A well-resourced Iranian nation-state group known as Boggy Serpens — also tracked as MuddyWater —…
A new wave of targeted attacks is quietly hitting Argentina’s judicial system, using fake court…
Microsoft has temporarily halted the automatic installation of the Microsoft 365 Copilot app on Windows…
This website uses cookies.