Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.camel/camel-platform-http-main
  4. ›
  5. CVE-2026-40022

CVE-2026-40022: Apache Camel Vulnerable to Authentication Bypass Using an Alternate Path or Channel

April 27, 2026 (updated May 5, 2026)

When authentication is enabled on the Apache Camel embedded HTTP server or embedded management server (camel-platform-http-main) and a non-root context path such as /api or /admin is configured via camel.server.path or camel.management.path, the BasicAuthenticationConfigurer and JWTAuthenticationConfigurer classes derive the authentication path from properties.getPath() when camel.server.authenticationPath / camel.management.authenticationPath is not explicitly set. Combined with the Vert.x sub-router mounting model - the sub-router is mounted at path* and the authentication handler is registered inside the sub-router at the resolved path - this causes the authentication handler to match only the exact configured context path, not its subpaths. Unauthenticated requests to subpaths such as /api/route or /admin/observe/info therefore reach protected business routes and management endpoints without being challenged for credentials. The /observe/info endpoint can disclose runtime metadata such as the user, working directory, home directory, process ID, JVM and operating system information.

This issue affects Apache Camel: from 4.14.1 before 4.14.6, from 4.18.0 before 4.18.2.

Users are recommended to upgrade to version 4.20.0, which fixes the issue. If users are on the 4.14.x LTS releases stream, they are suggested to upgrade to 4.14.6. If users are on the 4.18.x LTS releases stream, they are suggested to upgrade to 4.18.2.

References

  • camel.apache.org/security/CVE-2026-40022.html
  • github.com/advisories/GHSA-27vm-5vpj-rp5g
  • github.com/apache/camel
  • github.com/apache/camel/commit/6ec12cbebfc1b6360cdaac1c1f8c681864911695
  • github.com/apache/camel/commit/7b5b8c0283c0ab8d703d868ded7614018762a553
  • github.com/apache/camel/commit/a9ebee94af976ac2afd7906d2e76673067d8be86
  • github.com/apache/camel/pull/22474
  • github.com/apache/camel/pull/22475
  • github.com/apache/camel/pull/22476
  • nvd.nist.gov/vuln/detail/CVE-2026-40022

Code Behaviors & Features

Detect and mitigate CVE-2026-40022 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 4.14.1 before 4.14.6, all versions starting from 4.18.0 before 4.18.2, all versions starting from 4.19.0 before 4.20.0

Fixed versions

  • 4.14.6
  • 4.18.2
  • 4.20.0

Solution

Upgrade to versions 4.14.6, 4.18.2, 4.20.0 or above.

Impact 8.2 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N

Learn more about CVSS

Weakness

  • CWE-288: Authentication Bypass Using an Alternate Path or Channel

Source file

maven/org.apache.camel/camel-platform-http-main/CVE-2026-40022.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:02 +0000.