This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-website.git


The following commit(s) were added to refs/heads/main by this push:
     new 2adf6a09 Added CVE-2026-23552 and CVE-2026-25747 (#1514)
2adf6a09 is described below

commit 2adf6a09a605b8df8dbdaa277b3889d041fa298b
Author: Andrea Cosentino <[email protected]>
AuthorDate: Wed Feb 18 10:02:19 2026 +0100

    Added CVE-2026-23552 and CVE-2026-25747 (#1514)
    
    Signed-off-by: Andrea Cosentino <[email protected]>
---
 content/security/CVE-2026-23552.md      | 17 +++++++++++++++++
 content/security/CVE-2026-23552.txt.asc | 31 +++++++++++++++++++++++++++++++
 content/security/CVE-2026-25747.md      | 17 +++++++++++++++++
 content/security/CVE-2026-25747.txt.asc | 31 +++++++++++++++++++++++++++++++
 4 files changed, 96 insertions(+)

diff --git a/content/security/CVE-2026-23552.md 
b/content/security/CVE-2026-23552.md
new file mode 100644
index 00000000..aec127fb
--- /dev/null
+++ b/content/security/CVE-2026-23552.md
@@ -0,0 +1,17 @@
+---
+title: "Apache Camel Security Advisory - CVE-2026-23552"
+date: 2026-02-17T09:00:00+02:00
+url: /security/CVE-2026-23552.html
+draft: false
+type: security-advisory
+cve: CVE-2026-23552
+severity: HIGH
+summary: "Apache Camel: Camel-Keycloak: Cross-Realm Token Acceptance in 
KeycloakSecurityPolicy"
+description: "The Camel-Keycloak KeycloakSecurityPolicy does not validate the 
iss (issuer) claim of JWT tokens against the configured realm. A token issued 
by one Keycloak realm is silently accepted by a policy configured for a 
completely different realm, breaking tenant isolation."
+mitigation: "Users are recommended to upgrade to version 4.18.0, which fixes 
the issue."
+credit: "This issue was discovered by Andrea Cosentino from Apache Software 
Foundation"
+affected: From 4.15.0 before 4.18.0.
+fixed: 4.18.0
+---
+
+The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-22854 refers to 
the various commits that resolved the issue, and have more details.
diff --git a/content/security/CVE-2026-23552.txt.asc 
b/content/security/CVE-2026-23552.txt.asc
new file mode 100644
index 00000000..6872f1a4
--- /dev/null
+++ b/content/security/CVE-2026-23552.txt.asc
@@ -0,0 +1,31 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA512
+
+- ---
+title: "Apache Camel Security Advisory - CVE-2026-23552"
+date: 2026-02-17T09:00:00+02:00
+url: /security/CVE-2026-23552.html
+draft: false
+type: security-advisory
+cve: CVE-2026-23552
+severity: HIGH
+summary: "Apache Camel: Camel-Keycloak: Cross-Realm Token Acceptance in 
KeycloakSecurityPolicy"
+description: "The Camel-Keycloak KeycloakSecurityPolicy does not validate the 
iss (issuer) claim of JWT tokens against the configured realm. A token issued 
by one Keycloak realm is silently accepted by a policy configured for a 
completely different realm, breaking tenant isolation."
+mitigation: "Users are recommended to upgrade to version 4.18.0, which fixes 
the issue."
+credit: "This issue was discovered by Andrea Cosentino from Apache Software 
Foundation"
+affected: From 4.15.0 before 4.18.0.
+fixed: 4.18.0
+- ---
+
+The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-22854 refers to 
the various commits that resolved the issue, and have more details.
+-----BEGIN PGP SIGNATURE-----
+
+iQEzBAEBCgAdFiEEJ2Y0ButtuvUpHyYV406fOAL/QQAFAmmVfecACgkQ406fOAL/
+QQB7AAf+OapX92rNtAzQgkH7wO3Y7gsWscGBQlU3z3qY+kMobyp9tP+n7FRR02Vy
+hzyS+xh4bD8HHzXgl+d2dJ8FsQOKeJYqCVCCz0MC020uFL8fY/zJQx91n6CILzZ9
+tEsRSZXpcTowmXig67HYaLtDS0P7PDNnJX8ABUPAv9uSnzZUWpdVLrxI78K6xiGq
+Rjx4JFIwxXuB+thJStZqu1uv+xb6NezF4Ro/aXiam1Bu7BpujajHicz4naunFhSj
+Tzbysxt3rXmrvgXO2jobBWs4fh9WkShoSCjvXGGEvCnOjAxNSAOgkAUNzPzBdmrF
+ffM5UxGfAEixgQdg1wLeA1tS9cm2WQ==
+=0F8o
+-----END PGP SIGNATURE-----
diff --git a/content/security/CVE-2026-25747.md 
b/content/security/CVE-2026-25747.md
new file mode 100644
index 00000000..f17ddd08
--- /dev/null
+++ b/content/security/CVE-2026-25747.md
@@ -0,0 +1,17 @@
+---
+title: "Apache Camel Security Advisory - CVE-2026-25747"
+date: 2026-02-18T09:00:00+02:00
+url: /security/CVE-2026-25747.html
+draft: false
+type: security-advisory
+cve: CVE-2026-25747
+severity: HIGH
+summary: "Apache Camel: Camel-LevelDB: Unsafe Deserialization from 
LevelDBAggregationRepository"
+description: "The Camel-LevelDB DefaultLevelDBSerializer class deserializes 
data read from the LevelDB aggregation repository using 
java.io.ObjectInputStream without applying any ObjectInputFilter or 
class-loading restrictions. An attacker who can write to the LevelDB database 
files used by a Camel application can inject a crafted serialized Java object 
that, when deserialized during normal aggregation repository operations, 
results in arbitrary code execution in the context of the appli [...]
+mitigation: "Users are recommended to upgrade to version 4.18.0, which fixes 
the issue. If users are on the 4.10.x LTS releases stream, then they are 
suggested to upgrade to 4.10.9. If users are on the 4.14.x LTS releases stream, 
then they are suggested to upgrade to 4.14.5."
+credit: "This issue was discovered by Andrea Cosentino from Apache Software 
Foundation"
+affected: From 3.0.0 before 4.10.9, from 4.11.0 before 4.14.5, from 4.15.0 
before 4.18.0.
+fixed: 4.10.9, 4.14.5 and 4.18.0
+---
+
+The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-22966 refers to 
the various commits that resolved the issue, and have more details.
diff --git a/content/security/CVE-2026-25747.txt.asc 
b/content/security/CVE-2026-25747.txt.asc
new file mode 100644
index 00000000..0100c998
--- /dev/null
+++ b/content/security/CVE-2026-25747.txt.asc
@@ -0,0 +1,31 @@
+-----BEGIN PGP SIGNED MESSAGE-----
+Hash: SHA512
+
+- ---
+title: "Apache Camel Security Advisory - CVE-2026-25747"
+date: 2026-02-18T09:00:00+02:00
+url: /security/CVE-2026-25747.html
+draft: false
+type: security-advisory
+cve: CVE-2026-25747
+severity: HIGH
+summary: "Apache Camel: Camel-LevelDB: Unsafe Deserialization from 
LevelDBAggregationRepository"
+description: "The Camel-LevelDB DefaultLevelDBSerializer class deserializes 
data read from the LevelDB aggregation repository using 
java.io.ObjectInputStream without applying any ObjectInputFilter or 
class-loading restrictions. An attacker who can write to the LevelDB database 
files used by a Camel application can inject a crafted serialized Java object 
that, when deserialized during normal aggregation repository operations, 
results in arbitrary code execution in the context of the appli [...]
+mitigation: "Users are recommended to upgrade to version 4.18.0, which fixes 
the issue. If users are on the 4.10.x LTS releases stream, then they are 
suggested to upgrade to 4.10.9. If users are on the 4.14.x LTS releases stream, 
then they are suggested to upgrade to 4.14.5."
+credit: "This issue was discovered by Andrea Cosentino from Apache Software 
Foundation"
+affected: From 3.0.0 before 4.10.9, from 4.11.0 before 4.14.5, from 4.15.0 
before 4.18.0.
+fixed: 4.10.9, 4.14.5 and 4.18.0
+- ---
+
+The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-22966 refers to 
the various commits that resolved the issue, and have more details.
+-----BEGIN PGP SIGNATURE-----
+
+iQEzBAEBCgAdFiEEJ2Y0ButtuvUpHyYV406fOAL/QQAFAmmVffUACgkQ406fOAL/
+QQA54wf/bVarLmuaZu3lfQ4WIcMI1dxloORfKzunL+RmtzBuLcZV0jwVSaRp6EeT
+tzZiOw4ygk7Cih9sOeKI3TuIDpoCWIkvHdE9lU0AG0t+6fXH+xxB67juRtUJ+zKE
+Ws0D67EHQFXH8YCsoBEwiBxEzc5wMRN24we2QDd6Dr5h0ZCsWMg70+vYlEY6vp25
+GXaj0qu+LZNTCYTWfylbtTeNyBx9ZPahFp1JZlgpIk9AfSKyJSHbDRZ4JWiwYjcC
+TQf5Ejyi+OlBv+kNKELOEWs94g6IJmz57MrKqnRVzpU2DMmP3BsTyuxULrBSwRgj
+AkEVipsZ/dBM4EhGnu2SY+hRvE3KNg==
+=VGCl
+-----END PGP SIGNATURE-----

Reply via email to