{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-30177","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","state":"PUBLISHED","assignerShortName":"apache","dateReserved":"2025-03-17T14:21:01.706Z","datePublished":"2025-04-01T11:56:30.484Z","dateUpdated":"2025-04-01T18:42:45.532Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://repo.maven.apache.org/maven2","defaultStatus":"unaffected","packageName":"org.apache.camel:camel-undertow","product":"Apache Camel","vendor":"Apache Software Foundation","versions":[{"lessThan":"4.10.3","status":"affected","version":"4.10.0","versionType":"semver"},{"lessThan":"4.8.6","status":"affected","version":"4.8.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Mark Thorson of AT&T"},{"lang":"en","type":"reporter","value":"Mark Thorson of AT&T"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Bypass/Injection vulnerability in Apache Camel in Camel-Undertow component under particular conditions.</p><p>This issue affects Apache Camel: from 4.10.0 before 4.10.3, from 4.8.0 before 4.8.6.</p>Users are recommended to upgrade to version 4.10.3 for 4.10.x LTS and 4.8.6 for 4.8.x LTS.<br><br><div>Camel undertow component is vulnerable to Camel message header injection, in particular the custom header filter strategy used by the component only filter the \"out\" direction, while it doesn't filter the \"in\" direction.</div><br>This allows an attacker to include Camel specific headers that for some Camel components can alter the behaviour such as the camel-bean component, or the camel-exec component.<br><br>"}],"value":"Bypass/Injection vulnerability in Apache Camel in Camel-Undertow component under particular conditions.\n\nThis issue affects Apache Camel: from 4.10.0 before 4.10.3, from 4.8.0 before 4.8.6.\n\nUsers are recommended to upgrade to version 4.10.3 for 4.10.x LTS and 4.8.6 for 4.8.x LTS.\n\nCamel undertow component is vulnerable to Camel message header injection, in particular the custom header filter strategy used by the component only filter the \"out\" direction, while it doesn't filter the \"in\" direction.\n\n\nThis allows an attacker to include Camel specific headers that for some Camel components can alter the behaviour such as the camel-bean component, or the camel-exec component."}],"metrics":[{"other":{"content":{"text":"moderate"},"type":"Textual description of severity"}}],"problemTypes":[{"descriptions":[{"description":"Bypass/Injection","lang":"en"}]},{"descriptions":[{"cweId":"CWE-164","description":"CWE-164 Improper Neutralization of Internal Special Elements","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2025-04-01T11:56:30.484Z"},"references":[{"tags":["related"],"url":"https://camel.apache.org/security/CVE-2025-27636.html"},{"tags":["related"],"url":"https://camel.apache.org/security/CVE-2025-29891.html"},{"tags":["vendor-advisory"],"url":"https://lists.apache.org/thread/dj79zdgw01j337lr9gvyy4sv8xfyw8py"}],"source":{"defect":["CAMEL-21876"],"discovery":"UNKNOWN"},"title":"Apache Camel: Camel-Undertow Message Header Injection via Improper Filtering","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":6.5,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N","integrityImpact":"LOW","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"NONE","privilegesRequired":"NONE","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"timestamp":"2025-04-01T18:40:10.405496Z","id":"CVE-2025-30177","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-04-01T18:42:45.532Z"}}]}}