First published: Tue Apr 01 2025(Updated: )
Bypass/Injection vulnerability in Apache Camel in Camel-Undertow component under particular conditions. This issue affects Apache Camel: from 4.10.0 before 4.10.3, from 4.8.0 before 4.8.6. Users are recommended to upgrade to version 4.10.3 for 4.10.x LTS and 4.8.6 for 4.8.x LTS. Camel undertow component is vulnerable to Camel message header injection, in particular the custom header filter strategy used by the component only filter the "out" direction, while it doesn't filter the "in" direction. This allows an attacker to include Camel specific headers that for some Camel components can alter the behaviour such as the camel-bean component, or the camel-exec component.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Build of Apache Camel | >4.10.0<4.10.3 | |
Red Hat Build of Apache Camel | >4.8.0<4.8.6 | |
maven/org.apache.camel:camel-undertow | >=4.8.0<4.8.6 | 4.8.6 |
maven/org.apache.camel:camel-undertow | >=4.10.0<4.10.3 | 4.10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2025-30177 is classified as moderate, as it allows for bypass and injection vulnerabilities under specific conditions.
To mitigate CVE-2025-30177, upgrade Apache Camel to version 4.10.3 or 4.8.6 depending on your current version.
CVE-2025-30177 affects Apache Camel versions 4.10.0 to 4.10.2 and 4.8.0 to 4.8.5.
The CVE-2025-30177 vulnerability affects the Camel-Undertow component in Apache Camel.
Currently, the recommended approach for CVE-2025-30177 is to upgrade to the patched versions, as there are no specified workarounds.