CVE-2026-33453
Apache Camel's camel-coap component is vulnerable to header injection because it maps CoAP request URI query parameters directly into Camel message headers without applying a HeaderFilterStrategy. An unauthenticated attacker can send a crafted CoAP request to inject arbitrary Camel internal headers into the exchange.
When a vulnerable route forwards that exchange to a header-sensitive downstream producer, the attacker may be able to control producer behavior. For example, in routes using camel-exec, injected headers can override the configured executable and arguments, which can result in arbitrary command execution with the privileges of the Camel process. Command output may be returned to the attacker in the CoAP response.
This issue affects org.apache.camel:camel-coap from 4.14.0 through 4.14.5 and from 4.18.0 before 4.18.1. It is fixed in 4.14.6, 4.18.1, and 4.19.0.
Package Versions Affected
Automatically patch vulnerabilities without upgrading
CVSS Version



Related Resources
References
https://nvd.nist.gov/vuln/detail/CVE-2026-33453, https://github.com/apache/camel/pull/22146, https://github.com/apache/camel/pull/22147, https://github.com/apache/camel/pull/22148, https://github.com/apache/camel/commit/05cffa5ec05ff2ec3c50a77825625da6e426e7a8, https://github.com/apache/camel/commit/3926ab2b7745e36da2cd8e0dc019018bc415aff9, https://github.com/apache/camel/commit/e074c01a719cccf3b1c2efbd2ff31e60fd6220ce, https://camel.apache.org/security/CVE-2026-33453.html, https://github.com/apache/camel/blob/main/components/camel-coap, https://issues.apache.org/jira/browse/CAMEL-23222, http://www.openwall.com/lists/oss-security/2026/04/26/3
