-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- title: "Apache Camel Security Advisory - CVE-2026-40453" date: 2026-04-24T09:00:00+02:00 url: /security/CVE-2026-40453.html draft: false type: security-advisory cve: CVE-2026-40453 severity: Medium summary: "Incomplete fix for CVE-2025-27636 in non-HTTP HeaderFilterStrategies (camel-jms, camel-sjms, camel-coap, camel-google-pubsub) allows case-variant header injection" description: "The fix for CVE-2025-27636 added setLowerCase(true) to HttpHeaderFilterStrategy so that case-variant header names such as 'CAmelExecCommandExecutable' are filtered out alongside 'CamelExecCommandExecutable'. The same setLowerCase(true) call was not applied to five non-HTTP HeaderFilterStrategy implementations: JmsHeaderFilterStrategy and ClassicJmsHeaderFilterStrategy in camel-jms, SjmsHeaderFilterStrategy in camel-sjms, CoAPHeaderFilterStrategy in camel-coap, and GooglePubsubHeaderFilterStrategy in camel-google-pubsub. Because those strategies use case-sensitive String.startsWith('Camel'/'camel') filtering while the Camel Exchange stores headers in a case-insensitive map, an attacker with JMS (or equivalent) producer access to the broker consumed by a Camel route can inject case-variant Camel internal headers, which are then resolved by downstream components such as camel-exec and camel-file using their canonical casing. This enables remote code execution and arbitrary file write on routes that forward JMS messages to header-driven components." mitigation: "Users are recommended to upgrade to version 4.20.0, which fixes the issue. If users are on the 4.14.x LTS releases stream, then they are suggested to upgrade to 4.14.6. If users are on the 4.18.x releases stream, then they are suggested to upgrade to 4.18.2." credit: "This issue was discovered by Saroj Khadka" affected: "From 3.0.0 before 4.14.6, from 4.15.0 before 4.18.2, from 4.19.0 before 4.20.0." fixed: 4.14.6, 4.18.2 and 4.20.0 - --- The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-23313 refers to the various commits that resolved the issue, and have more details. This advisory completes the fix for CVE-2025-27636 by extending setLowerCase(true) to the non-HTTP HeaderFilterStrategy implementations that were not updated in the original 2025-03-09 advisory. -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEJ2Y0ButtuvUpHyYV406fOAL/QQAFAmnrXigACgkQ406fOAL/ QQCWZQf/Rv3yq4EvaPy6Da+ITk9Ef/JWO7B+6/3w2jrC/JMWZM4wO62stVtZUA6V W5T2YRBlCueEI+NoO2xE6W+3+qrKvO/1lSehmPvIs200wVDkC1MFA+ecmKXHFWbn ILH6H0kqSnoKUem1FqlzmRiMom1AkSZHOKQvGMB+R+U0NbGr7iwc/bBeRJfpEh4Q rpokk7YK5p4j2VaiAZQ3hEthbLdynIyR+kLNW3OuEPva67kki4Q0sUF0ndWwpNxx 0HXXqjqW4ms4LzEaZ434HBnPh7Dm5H85QGL60CidKpq7EkOlL1V4DcJlz8dgunVl si5chMIQo+h2hldDuHzahHKAqrr4nQ== =t64t -----END PGP SIGNATURE-----