-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- title: "Apache Camel Security Advisory - CVE-2026-40022" date: 2026-04-24T09:00:00+02:00 url: /security/CVE-2026-40022.html draft: false type: security-advisory cve: CVE-2026-40022 severity: MEDIUM summary: "Camel-Platform-HTTP-Main: Authentication Bypass on Non-Root Context Paths in camel main runtime" description: "When authentication is enabled on the Apache Camel embedded HTTP server or embedded management server (camel-platform-http-main) and a non-root context path such as /api or /admin is configured via camel.server.path or camel.management.path, the BasicAuthenticationConfigurer and JWTAuthenticationConfigurer classes derive the authentication path from properties.getPath() when camel.server.authenticationPath / camel.management.authenticationPath is not explicitly set. Combined with the Vert.x sub-router mounting model — the sub-router is mounted at _path_* and the authentication handler is registered inside the sub-router at the resolved path — this causes the authentication handler to match only the exact configured context path, not its subpaths. Unauthenticated requests to subpaths such as /api/_route_ or /admin/observe/info therefore reach protected business routes and management endpoints without being challenged for credentials. The /observe/info endpoint can disclose runtime metadata such as the user, working directory, home directory, process ID, JVM and operating system information." mitigation: "Users are recommended to upgrade to version 4.20.0, which fixes the issue. If users are on the 4.14.x LTS releases stream, they are suggested to upgrade to 4.14.6. If users are on the 4.18.x LTS releases stream, they are suggested to upgrade to 4.18.2." credit: "This issue was discovered by Jihang Yu" affected: From 4.14.1 before 4.14.6, from 4.15.0 before 4.18.2. fixed: 4.14.6, 4.18.2 and 4.20.0 - --- The pull requests https://github.com/apache/camel/pull/22474 (main), https://github.com/apache/camel/pull/22475 (4.18.x) and https://github.com/apache/camel/pull/22476 (4.14.x) refer to the commits that resolved the issue, and have more details. -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEJ2Y0ButtuvUpHyYV406fOAL/QQAFAmnuDiAACgkQ406fOAL/ QQBBdgf/f+uFKbqgRLgMzY9/A6LdWFBnPOLP7r+Y9eWTaVTIDgO8czMSZJxhVXlS vTz1UZWWyppg4WvoUz8+uvCAK4oH6530ayZ5Zrv2CudR6vB4FNNwsa3Uj4ednpGH 0+DA2KbYPcvordk162LKBPCQFeV7ppXRQO5xTH8Ec/6RRehDAzp+W4woDwDuFWPZ WN4CxbeslVMnCstIRqwM/Q8GT9QHSz3DAFVKvRgolpJ7WmvaI2OltzHxQQ+a+Lhc CsAakgEsE5ZqciLT3afivcT4A7P+S91D5fRkSHvNkksdpTbgYJIoNoAZtwhK66Mi /n1Pvmk+gnXUb7BbKWjY9N4qb7Jkgw== =XMTt -----END PGP SIGNATURE-----