The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-40453

CVE-2026-40453: Apache Camel RCE Vulnerability

CVE-2026-40453 is a remote code execution flaw in Apache Camel caused by case-variant header filtering bypass in JMS components. Attackers can inject malicious headers to execute code or write files.

Published: April 30, 2026

CVE-2026-40453 Overview

CVE-2026-40453 is a critical remote code execution vulnerability in Apache Camel arising from an incomplete security fix for CVE-2025-27636. While the previous fix added case-insensitive filtering to HttpHeaderFilterStrategy, five non-HTTP header filter implementations were left vulnerable to case-variant header injection attacks. These vulnerable components—JmsHeaderFilterStrategy, ClassicJmsHeaderFilterStrategy, SjmsHeaderFilterStrategy, CoAPHeaderFilterStrategy, and GooglePubsubHeaderFilterStrategy—continue to use case-sensitive String.startsWith('Camel'/'camel') filtering while the Camel Exchange stores headers in a case-insensitive map.

This discrepancy allows attackers with JMS (or equivalent) producer access to inject case-variant Camel internal headers such as CAmelExecCommandExecutable, which bypass the filter but are then resolved by downstream components using their canonical casing. This enables remote code execution through components like camel-exec and arbitrary file write through camel-file on vulnerable routes.

Critical Impact

Attackers with producer access to message brokers consumed by Apache Camel routes can achieve remote code execution and arbitrary file write by injecting case-variant internal headers that bypass security filters.

Affected Products

  • Apache Camel versions 3.0.0 to 4.14.5
  • Apache Camel versions 4.15.0 to 4.18.1
  • Apache Camel version 4.19.0

Discovery Timeline

  • 2026-04-27 - CVE-2026-40453 published to NVD
  • 2026-04-28 - Last updated in NVD database

Technical Details for CVE-2026-40453

Vulnerability Analysis

The vulnerability stems from an improper implementation of case sensitivity handling (CWE-178) in multiple header filter strategy components within Apache Camel. When the fix for CVE-2025-27636 was implemented, it correctly addressed the issue in HttpHeaderFilterStrategy by calling setLowerCase(true), ensuring that header names like CAmelExecCommandExecutable would be normalized and filtered alongside CamelExecCommandExecutable.

However, this critical fix was not applied to five other header filter strategy implementations across different Camel modules. The JmsHeaderFilterStrategy and ClassicJmsHeaderFilterStrategy in camel-jms, SjmsHeaderFilterStrategy in camel-sjms, CoAPHeaderFilterStrategy in camel-coap, and GooglePubsubHeaderFilterStrategy in camel-google-pubsub all continue to perform case-sensitive string matching when filtering headers.

The core issue lies in the architectural mismatch: these filter strategies use case-sensitive String.startsWith('Camel') or String.startsWith('camel') checks, while the underlying Camel Exchange stores headers in a case-insensitive map. When a header like CAmelExecCommandExecutable passes through the filter (because it doesn't match the case-sensitive check), it gets stored in the Exchange and is later resolved by downstream components such as camel-exec using case-insensitive lookup, treating it as the canonical CamelExecCommandExecutable header.

Root Cause

The root cause is CWE-178: Improper Handling of Case Sensitivity. The incomplete propagation of the setLowerCase(true) fix across all header filter strategy implementations created a security gap. While HTTP-based routes were protected after the CVE-2025-27636 fix, non-HTTP message transports remained vulnerable because their filter strategies maintained case-sensitive behavior that conflicted with the case-insensitive header storage in Camel Exchange.

Attack Vector

The attack requires producer access to a message broker (JMS, CoAP, or Google Pub/Sub) that is consumed by a vulnerable Apache Camel route. An attacker crafts messages containing case-variant Camel internal headers that bypass the case-sensitive filter checks. When these messages reach downstream header-driven components like camel-exec or camel-file, the headers are resolved using case-insensitive lookup, allowing the attacker to control execution parameters.

For exploitation via camel-exec, an attacker can inject headers like CAmelExecCommandExecutable or cAMELExecCommandArgs to specify arbitrary commands and arguments. For camel-file, similar techniques can be used to control file paths and content, enabling arbitrary file write operations. The network-accessible attack vector with low complexity makes this particularly dangerous in environments where message broker access is not strictly controlled.

Detection Methods for CVE-2026-40453

Indicators of Compromise

  • JMS or message queue traffic containing unusual case-variant Camel headers (e.g., CAmel*, cAMEL*, CAMEL*)
  • Unexpected process execution originating from Camel application processes, particularly via the camel-exec component
  • Suspicious file write operations in directories accessed by Camel routes
  • Anomalous system commands being executed in the context of the application server running Apache Camel

Detection Strategies

  • Implement deep packet inspection on message broker traffic to identify headers matching case-insensitive patterns for Camel* internal headers
  • Deploy application-level logging to capture all incoming message headers before and after filter processing
  • Monitor process creation events on systems running Apache Camel, alerting on child processes spawned by Java/Camel runtime
  • Analyze message queue audit logs for messages containing multiple header variations targeting Camel internal namespaces

Monitoring Recommendations

  • Enable verbose logging for camel-jms, camel-sjms, camel-coap, and camel-google-pubsub components to capture header processing details
  • Configure SIEM rules to correlate JMS message ingestion events with subsequent command execution or file system modifications
  • Establish baseline behavior for Camel route processing and alert on deviations, particularly unexpected exec or file operations
  • Monitor for reconnaissance activity such as repeated message submissions with varying header casing patterns

How to Mitigate CVE-2026-40453

Immediate Actions Required

  • Upgrade Apache Camel to version 4.20.0 immediately for production environments
  • For organizations using the 4.14.x LTS stream, upgrade to version 4.14.6
  • For organizations on the 4.18.x release stream, upgrade to version 4.18.2
  • Audit all Camel routes that consume from JMS, CoAP, or Google Pub/Sub endpoints and forward to header-driven components like camel-exec or camel-file

Patch Information

Apache has released patched versions that apply the setLowerCase(true) fix consistently across all header filter strategy implementations. Users should upgrade to one of the following versions based on their deployment stream:

  • Version 4.20.0: Primary recommended upgrade for all users
  • Version 4.14.6: For users on the 4.14.x LTS release stream
  • Version 4.18.2: For users on the 4.18.x release stream

Detailed patch information and upgrade instructions are available in the Apache Camel CVE-2026-40453 Advisory.

Workarounds

  • Restrict producer access to message brokers consumed by Camel routes to trusted internal systems only
  • Implement custom header filtering at the message broker level to reject messages containing any case-variant Camel headers before they reach Camel consumers
  • Remove or disable routes that forward messages from JMS/CoAP/Pub/Sub endpoints to sensitive components like camel-exec and camel-file until patching is complete
  • Deploy a custom Camel interceptor that normalizes all incoming header names to lowercase before route processing
bash
# Configuration example - Restrict Camel exec component to specific commands
# In camel-context configuration, limit executable paths
# Note: This is a defense-in-depth measure, not a complete fix
export CAMEL_EXEC_ALLOWED_COMMANDS="/usr/bin/allowed-command1,/usr/bin/allowed-command2"
# Ensure message broker authentication is enabled
# For ActiveMQ example:
activemq.username=secure_user
activemq.password=strong_password_here
# Enable SSL/TLS for broker connections
activemq.broker.ssl.enabled=true

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeRCE

  • Vendor/TechApache Camel

  • SeverityCRITICAL

  • CVSS Score9.9

  • EPSS Probability0.17%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-178
  • Vendor Resources
  • Apache Camel CVE-2026-40453 Advisory
  • Related CVEs
  • CVE-2026-40048: Apache Camel RCE Vulnerability

  • CVE-2026-40473: Apache Camel RCE Vulnerability

  • CVE-2026-40860: Apache Camel JMS RCE Vulnerability

  • CVE-2026-40858: Apache Camel RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English