Apache Camel Vulnerability Let Attackers Inject Arbitrary Headers – PoC Exploit Released
A critical security flaw in Apache Camel’s header validation mechanism allows attackers to execute arbitrary system commands by exploiting case-sensitive header injection. A POC released for CVE-2025-27636, this vulnerability impacts Apache Camel versions 4.10.0-4.10.1, 4.8.0-4.8.4, and 3.10.0-3.22.3, exposing systems using vulnerable Exec component configurations to remote code execution (RCE). Apache Camel Vulnerability The vulnerability stems […] The post Apache Camel Vulnerability Let Attackers Inject Arbitrary Headers – PoC Exploit Released appeared first on Cyber Security News.

A critical security flaw in Apache Camel’s header validation mechanism allows attackers to execute arbitrary system commands by exploiting case-sensitive header injection.
A POC released for CVE-2025-27636, this vulnerability impacts Apache Camel versions 4.10.0-4.10.1, 4.8.0-4.8.4, and 3.10.0-3.22.3, exposing systems using vulnerable Exec component configurations to remote code execution (RCE).
Apache Camel Vulnerability
The vulnerability stems from improper case normalization when filtering HTTP headers in Camel’s Exec component.
While Apache Camel documentation specifies that headers like CamelExecCommandExecutable should be sanitized to prevent command override, attackers can bypass these filters using mixed-case variants such as CAmelExecCommandExecutable.
This allows malicious actors to replace statically defined commands in Camel routes with arbitrary executables.
Consider this vulnerable Camel route configuration:
Normally, the exec:whoami endpoint would execute the whoami command. However, the flawed header validation enables attackers to override this command via crafted HTTP requests.
The issue has a CVSS 9.8 (Critical) rating, indicating a low attack complexity and high exploitability.
Exploitation Methodology
Attackers exploit this vulnerability by sending HTTP requests with malicious headers. This executes ls instead of whoami, returning directory contents:
This executes ping -c 2 8.8.8.8, demonstrating network reconnaissance capabilities.
Impact Analysis
The vulnerability enables:
- Arbitrary Command Execution: Full control over system commands via HTTP header manipulation
- Lateral Movement: Execution of network scanning tools and credential harvesters
- Persistence Mechanisms: Installation of reverse shells or backdoors
Notably, standard headers like CamelExecCommandExecutable (correctly cased) remain filtered, creating a false sense of security.
This case-sensitive bypass affects all Camel components that dynamically process headers, making other endpoints beyond Exec potentially vulnerable.
Mitigation Strategies
Apache Camel has addressed this in versions 4.10.2, 4.8.5, and 3.22.4 through improved case-insensitive header filtering. Administrators should:
- Upgrade to patched Camel versions
- Implement regex filters for all Camel endpoint headers
- Restrict Camel HTTP endpoints to trusted networks
For temporary mitigation, security teams can override the ExecBinding class to enforce case-insensitive header validation:
Cybersecurity firm RedHunt Labs observed active exploitation in cloud-native environments, particularly targeting Kubernetes clusters using Camel for service orchestration.
This vulnerability underscores the critical need for consistent case normalization in HTTP header processing—a lesson with implications beyond Apache Camel to all header-driven middleware systems.
Organizations using Camel for enterprise integration patterns should conduct immediate audits of all HTTP-exposed Camel routes and implement protocol-level validation controls.
Are you from SOC/DFIR Teams? – Analyse Malware Incidents & get live Access with ANY.RUN -> Start Now for Free.
The post Apache Camel Vulnerability Let Attackers Inject Arbitrary Headers – PoC Exploit Released appeared first on Cyber Security News.