-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA512 - --- title: "Apache Camel Security Advisory - CVE-2026-40453" date: 2026-04-24T09:00:00+02:00 url: /security/CVE-2026-40453.html draft: false type: security-advisory cve: CVE-2026-40453 severity: MEDIUM summary: "Incomplete fix for CVE-2025-27636 in non-HTTP HeaderFilterStrategies (camel-jms, camel-sjms, camel-coap, camel-google-pubsub) allows case-variant header injection" description: "The fix for CVE-2025-27636 added setLowerCase(true) to HttpHeaderFilterStrategy so that case-variant header names such as 'CAmelExecCommandExecutable' are filtered out alongside 'CamelExecCommandExecutable'. The same setLowerCase(true) call was not applied to five non-HTTP HeaderFilterStrategy implementations: JmsHeaderFilterStrategy and ClassicJmsHeaderFilterStrategy in camel-jms, SjmsHeaderFilterStrategy in camel-sjms, CoAPHeaderFilterStrategy in camel-coap, and GooglePubsubHeaderFilterStrategy in camel-google-pubsub. Because those strategies use case-sensitive String.startsWith('Camel'/'camel') filtering while the Camel Exchange stores headers in a case-insensitive map, an attacker with JMS (or equivalent) producer access to the broker consumed by a Camel route can inject case-variant Camel internal headers, which are then resolved by downstream components such as camel-exec and camel-file using their canonical casing. This enables remote code execution and arbitrary file write on routes that forward JMS messages to header-driven components." mitigation: "Users are recommended to upgrade to version 4.20.0, which fixes the issue. If users are on the 4.14.x LTS releases stream, then they are suggested to upgrade to 4.14.6. If users are on the 4.18.x releases stream, then they are suggested to upgrade to 4.18.2." credit: "This issue was discovered by Saroj Khadka" affected: "From 3.0.0 before 4.14.6, from 4.15.0 before 4.18.2, from 4.19.0 before 4.20.0." fixed: 4.14.6, 4.18.2 and 4.20.0 - --- The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-23313 refers to the various commits that resolved the issue, and have more details. This advisory completes the fix for CVE-2025-27636 by extending setLowerCase(true) to the non-HTTP HeaderFilterStrategy implementations that were not updated in the original 2025-03-09 advisory. -----BEGIN PGP SIGNATURE----- iQEzBAEBCgAdFiEEJ2Y0ButtuvUpHyYV406fOAL/QQAFAmn69J0ACgkQ406fOAL/ QQC42AgAn7UbY2Uga0/YBGzYNj0+jKybmG/Oh+D4uwbM9CcvmE9b03s9nigITmYG aS7jsixRGPeYjfYSccUacKzJ8GyEw2p3Mx7uTQzggATfXI9+DmwDFg6qPeLzSLtw iSSuTdDXHXVVp/u0pHkncMGmv0kzOJC8OiJeZp3+Rvs+JGFjyv4TchqiEXQsZzJU O1TCXnbx/QdLRuc2LC6kxpXFryCRqLpZm1pM0XGzwimphau2JlGCRw80jTnUvd2b 5+0gN/0q7qkibEtxWhYEC2+wl0drep+1wIfTWYxs/wO3T9NMnw3Cvmo7cwXedMVb ZX1ApP7NhHkG55t3BtTy9qdGxwPGYg== =ApgL -----END PGP SIGNATURE-----