CVE-2026-47323
Awaiting Analysis Awaiting Analysis - Queue
Header Injection in Apache Camel CXF and Knative Components

Publication date: 2026-05-19

Last updated on: 2026-05-20

Assigner: Apache Software Foundation

Description
Camel-CXF and Camel-Knative Message Header Injection via Missing Inbound Filtering The CXF and Knative HeaderFilterStrategy implementations (CxfRsHeaderFilterStrategy in camel-cxf-rest, CxfHeaderFilterStrategy in camel-cxf-transport, and KnativeHttpHeaderFilterStrategy in camel-knative-http) only filter outbound Camel-internal headers via setOutFilterStartsWith, while not configuring inbound filtering via setInFilterStartsWith. As a result, an unauthenticated attacker can inject Camel-internal headers (e.g. CamelExecCommandExecutable, CamelFileName) via HTTP requests to CXF-RS or CXF-SOAP endpoints. When a route forwards messages from these endpoints to header-driven components such as camel-exec or camel-file, the injected headers override configured values, enabling remote code execution or arbitrary file writes. This is the same pattern that was previously addressed in camel-undertow (CVE-2025-30177), the broader incoming-header filter (CVE-2025-27636 and CVE-2025-29891), and non-HTTP strategies (CVE-2026-40453). This issue affects Apache Camel: from 3.18.0 before 4.14.6, from 4.15.0 before 4.18.2. Users are recommended to upgrade to version 4.19.0, which fixes the issue. If users are on the 4.18.x LTS releases stream, then they are suggested to upgrade to 4.18.2. If users are on the 4.14.x LTS releases stream, then they are suggested to upgrade to 4.14.6.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-19
Last Modified
2026-05-20
Generated
2026-05-20
AI Q&A
2026-05-19
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
apache camel to 4.14.6 (exc)
apache camel to 4.18.2 (exc)
apache camel 4.19.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-178 The product does not properly account for differences in case sensitivity when accessing or determining the properties of a resource, leading to inconsistent results.
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify how this vulnerability impacts compliance with common standards and regulations such as GDPR or HIPAA.


Can you explain this vulnerability to me?

This vulnerability involves message header injection in Apache Camel's CXF and Knative components due to missing inbound header filtering. Specifically, the implementations only filter outbound Camel-internal headers but do not filter inbound headers. As a result, an unauthenticated attacker can inject Camel-internal headers via HTTP requests to CXF-RS or CXF-SOAP endpoints.

When these injected headers are forwarded to header-driven components such as camel-exec or camel-file, they can override configured values. This can enable remote code execution or arbitrary file writes, posing a significant security risk.


How can this vulnerability impact me? :

The vulnerability allows an unauthenticated attacker to inject malicious headers that can override configuration in components like camel-exec or camel-file. This can lead to remote code execution or arbitrary file writes on the affected system.

Such impacts can compromise the integrity and security of your applications, potentially allowing attackers to execute arbitrary commands or manipulate files without authorization.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, users are strongly advised to upgrade their Apache Camel installations to fixed versions.

  • Upgrade to Apache Camel version 4.19.0 or later.
  • If using the 4.18.x LTS release stream, upgrade to version 4.18.2 or later.
  • If using the 4.14.x LTS release stream, upgrade to version 4.14.6 or later.

Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart