CVE-2025-27636 – Remote Code Execution in Apache Camel via C... #1093
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
🤖 Automated Content Update
This PR was automatically generated by the HackTricks News Bot based on a technical blog post.
📝 Source Information
🎯 Content Summary
CVE-2025-27636: Apache Camel Exec Component Remote Code Execution
Overview
CVE-2025-27636 is a medium-severity (CVSS:3.1/5.6, EPSS:35.5%) remote code execution vulnerability in Apache Camel’s
exec
component affecting versions3.10.0–3.22.3
,4.8.0–4.8.4
, and4.10.0–4.10.1
. Published on March 19, 2025, it was patched in Camel3.22.4
,4.8.5
, and4.10.2...
🔧 Technical Details
An attacker injects or uploads a malicious Apache Camel XML route definition that registers the Command Center exec endpoint (e.g., in Camel’s XML DSL:
By sending HTTP headers with mixed-case names matching sensitive parameters (for example, using
CAmelExecCommandExecutable
andCAm...
🤖 Agent Actions
Added a new section on HTTP header name casing bypasses—illustrated with CVE-2025-27636 (Apache Camel exec RCE)—to the “Special HTTP headers” page.
Key updates:
• Explained the technique, abuse workflow, detection & mitigations
• Provided a practical curl PoC for the Camel vulnerability
• Restored “## References” header and appended the OffSec blog reference
This enriches the header-manipulation content and documents an important real-world case-sensitive filtering bypass.
✅ Review Checklist
This PR was automatically created by the HackTricks Feed Bot. Please review the changes carefully before merging.
📚 Repository Maintenance
All .md files have been checked for proper formatting (headers, includes, etc.).