Cyber Posture

CVE-2026-33453

Critical

Published: 27 April 2026

Published
27 April 2026
Modified
28 April 2026
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0046 64.4th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33453 is a critical-severity Improperly Controlled Modification of Dynamically-Determined Object Attributes (CWE-915) vulnerability in Apache Camel. Its CVSS base score is 10.0 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 35.6% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Remediates the header injection flaw in camel-coap by applying vendor patches to upgrade Apache Camel to fixed versions like 4.18.1 or later.

prevent

Validates and sanitizes CoAP URI query parameters prior to mapping them into Camel Exchange headers to block injection of malicious Camel-prefixed headers.

prevent

Restricts or disables unnecessary header-sensitive producers like camel-exec or the camel-coap component to limit exploitation pathways.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1059 Command and Scripting Interpreter Execution
Adversaries may abuse command and script interpreters to execute commands, scripts, or binaries.
Why these techniques?

The vulnerability enables exploitation of a public-facing CoAP application component for unauthenticated remote access (T1190). It directly facilitates arbitrary OS command execution through header injection into camel-exec and similar producers (T1059).

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

Improperly Controlled Modification of Dynamically-Determined Object Attributes vulnerability in Apache Camel Camel-Coap component. Apache Camel's camel-coap component is vulnerable to Camel message header injection, leading to remote code execution when routes forward CoAP requests to header-sensitive producers (e.g. camel-exec) The…

more

camel-coap component maps incoming CoAP request URI query parameters directly into Camel Exchange In message headers without applying any HeaderFilterStrategy. Specifically, CamelCoapResource.handleRequest() iterates over OptionSet.getUriQuery() and calls camelExchange.getIn().setHeader(...) for every query parameter. CoAPEndpoint extends DefaultEndpoint rather than DefaultHeaderFilterStrategyEndpoint, and CoAPComponent does not implement HeaderFilterStrategyComponent; the component contains no references to HeaderFilterStrategy at all. As a result, an unauthenticated attacker who can send a single CoAP UDP packet to a Camel route consuming from coap:// can inject arbitrary Camel internal headers (those prefixed with Camel*) into the Exchange. When the route delivers the message to a header-sensitive producer such as camel-exec, camel-sql, camel-bean, camel-file, or template components (camel-freemarker, camel-velocity), the injected headers can alter the producer's behavior. In the case of camel-exec, the CamelExecCommandExecutable and CamelExecCommandArgs headers override the executable and arguments configured on the endpoint, resulting in arbitrary OS command execution under the privileges of the Camel process. The producer's output is written back to the Exchange body and returned in the CoAP response payload by CamelCoapResource, giving the attacker an interactive RCE channel without any need for out-of-band exfiltration. Exploitation prerequisites are minimal: a single unauthenticated UDP datagram to the CoAP port (default 5683). CoAP (RFC 7252) has no built-in authentication, and DTLS is optional and disabled by default. Because the protocol is UDP-based, HTTP-layer WAF/IDS controls do not apply. This issue affects Apache Camel: from 4.14.0 through 4.14.5, from 4.18.0 before 4.18.1, 4.19.0. Users are recommended to upgrade to version 4.18.1 or 4.19.0, fixing the issue.

Deeper analysisAI

CVE-2026-33453 is an Improperly Controlled Modification of Dynamically-Determined Object Attributes vulnerability (CWE-915) in the Apache Camel camel-coap component. The issue arises because the component maps incoming CoAP request URI query parameters directly into Camel Exchange In message headers without applying any HeaderFilterStrategy, specifically in CamelCoapResource.handleRequest() which iterates over OptionSet.getUriQuery() and calls camelExchange.getIn().setHeader() for each parameter. This enables Camel message header injection, leading to remote code execution when routes forward CoAP requests to header-sensitive producers such as camel-exec, camel-sql, camel-bean, camel-file, or template components like camel-freemarker and camel-velocity. The vulnerability affects Apache Camel versions from 4.14.0 through 4.14.5, from 4.18.0 before 4.18.1, and 4.19.0, with a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H).

An unauthenticated attacker can exploit this vulnerability by sending a single CoAP UDP datagram to a Camel route consuming from coap:// on the target CoAP port (default 5683). The injected headers, particularly those prefixed with Camel*, override producer behavior; for example, CamelExecCommandExecutable and CamelExecCommandArgs headers in camel-exec allow arbitrary OS command execution under the privileges of the Camel process. The producer's output is written back to the Exchange body and returned in the CoAP response payload, providing an interactive remote code execution channel without out-of-band exfiltration. Exploitation prerequisites are minimal, as CoAP (RFC 7252) lacks built-in authentication, DTLS is optional and disabled by default, and the UDP nature bypasses HTTP-layer WAF/IDS controls.

The Apache Camel security advisory and related announcements recommend upgrading to version 4.18.1 or 4.19.0, which address the issue by fixing the header injection in the camel-coap component. Additional details are available in the official advisory at https://camel.apache.org/security/CVE-2026-33453.html and the oss-security mailing list post at http://www.openwall.com/lists/oss-security/2026/04/26/3.

Details

CWE(s)

Affected Products

apache
camel
4.18.0, 4.19.0 · 4.14.0 — 4.14.5

CVEs Like This One

CVE-2026-40473Same product: Apache Camel
CVE-2026-40860Same product: Apache Camel
CVE-2026-33454Same product: Apache Camel
CVE-2025-27636Same product: Apache Camel
CVE-2026-25747Same product: Apache Camel
CVE-2026-40453Same product: Apache Camel
CVE-2026-23552Same product: Apache Camel
CVE-2026-40022Same product: Apache Camel
CVE-2026-40858Same product: Apache Camel
CVE-2026-40048Same product: Apache Camel

References