CVE-2025-30177: Apache Camel Missing Header Out Filter Leads to Potential Bypass/Injection Vulnerability
Bypass/Injection vulnerability in Apache Camel in Camel-Undertow component under particular conditions.
This issue affects Apache Camel: from 4.10.0 before 4.10.3, from 4.8.0 before 4.8.6.
Users are recommended to upgrade to version 4.10.3 for 4.10.x LTS and 4.8.6 for 4.8.x LTS.
Camel undertow component is vulnerable to Camel message header injection, in particular the custom header filter strategy used by the component only filter the “out” direction, while it doesn’t filter the “in” direction.
This allows an attacker to include Camel specific headers that for some Camel components can alter the behaviour such as the camel-bean component, or the camel-exec component.
References
- camel.apache.org/security/CVE-2025-27636.html
- camel.apache.org/security/CVE-2025-29891.html
- github.com/advisories/GHSA-vq4p-pchp-6g6v
- github.com/apache/camel
- github.com/apache/camel/commit/9fd8fc30dbd98511a1faa0cbcf39ef5aeec88a64
- lists.apache.org/thread/dj79zdgw01j337lr9gvyy4sv8xfyw8py
- nvd.nist.gov/vuln/detail/CVE-2025-30177
Code Behaviors & Features
Detect and mitigate CVE-2025-30177 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →