This is an automated email from the ASF dual-hosted git repository.

acosentino pushed a commit to branch main
in repository https://gitbox.apache.org/repos/asf/camel-website.git


The following commit(s) were added to refs/heads/main by this push:
     new c63521d8 Update the severity of CVE-2025-27636 to Medium instead of 
moderate
c63521d8 is described below

commit c63521d8c1459f6de4d97127f6da9395c85a25ac
Author: Andrea Cosentino <anco...@gmail.com>
AuthorDate: Tue Apr 1 18:25:41 2025 +0200

    Update the severity of CVE-2025-27636 to Medium instead of moderate
    
    Signed-off-by: Andrea Cosentino <anco...@gmail.com>
---
 content/security/CVE-2025-27636.md      |  2 +-
 content/security/CVE-2025-27636.txt.asc | 18 +++++++++---------
 2 files changed, 10 insertions(+), 10 deletions(-)

diff --git a/content/security/CVE-2025-27636.md 
b/content/security/CVE-2025-27636.md
index 64146587..c561508b 100644
--- a/content/security/CVE-2025-27636.md
+++ b/content/security/CVE-2025-27636.md
@@ -5,7 +5,7 @@ url: /security/CVE-2025-27636.html
 draft: false
 type: security-advisory
 cve: CVE-2025-27636
-severity: MODERATE
+severity: MEDIUM
 summary: "Camel Message Header Injection via Improper Filtering"
 description: "This vulnerability is only present in the following situation. 
The user is using one of the following HTTP Servers via one the of the 
following Camel components: camel-servlet, camel-jetty, camel-undertow, 
camel-platform-http and camel-netty-http and in the route, the exchange will be 
routed to a camel-bean producer. So ONLY camel-bean component is affected. In 
particular: The bean invocation (is only affected if you use any of the above 
together with camel-bean component)  [...]
 headers that for some Camel components can alter the behaviours such as the 
camel-bean component, to call another method
diff --git a/content/security/CVE-2025-27636.txt.asc 
b/content/security/CVE-2025-27636.txt.asc
index 488a20aa..0b652cec 100644
--- a/content/security/CVE-2025-27636.txt.asc
+++ b/content/security/CVE-2025-27636.txt.asc
@@ -8,7 +8,7 @@ url: /security/CVE-2025-27636.html
 draft: false
 type: security-advisory
 cve: CVE-2025-27636
-severity: MODERATE
+severity: MEDIUM
 summary: "Camel Message Header Injection via Improper Filtering"
 description: "This vulnerability is only present in the following situation. 
The user is using one of the following HTTP Servers via one the of the 
following Camel components: camel-servlet, camel-jetty, camel-undertow, 
camel-platform-http and camel-netty-http and in the route, the exchange will be 
routed to a camel-bean producer. So ONLY camel-bean component is affected. In 
particular: The bean invocation (is only affected if you use any of the above 
together with camel-bean component)  [...]
 headers that for some Camel components can alter the behaviours such as the 
camel-bean component, to call another method
@@ -56,12 +56,12 @@ fixed: 3.22.4, 4.8.5 and 4.10.2
 The JIRA ticket: https://issues.apache.org/jira/browse/CAMEL-21828 refers to 
the various commits that resolved the issue, and have more details.
 -----BEGIN PGP SIGNATURE-----
 
-iQEzBAEBCAAdFiEEJ2Y0ButtuvUpHyYV406fOAL/QQAFAmfSlIEACgkQ406fOAL/
-QQCJ5ggApUZBHWtrwEKRBR02ni+Xm5h7aOOXnQIVzGyXwPBB1ZI0J5VOOIyePE64
-PC69UbGzqBxkYbURGqAiBJqfdpaISDkDD9zKWugIZG1DNtwg1VxqMA6/KJKQYt1g
-AzKf1m1b9guCwuFQjqIh04bMXrKhu9bOPGqjuE9SwHK8SPQgYI1tkWEZjKjfyAlc
-xZBZRP+VKpxOKwKOwHmVHSWZ0in8YshevmKw48p7g1BN7ACcA/rY9gYzJ7YRhkkb
-RHzXIPEQ3PFWG6HAXYuSqUy+hi7hfVKdBWrdqW6+OTqcHtgR4ZPZmO7ZEoKUKxQE
-8ryHjb5SRVw3BaS6nvvPEGzRhQbFRQ==
-=X5cK
+iQEzBAEBCAAdFiEEJ2Y0ButtuvUpHyYV406fOAL/QQAFAmfsE2wACgkQ406fOAL/
+QQCzswf6A7sqnQYh83jNeV2VcfrrcIq9hsvmw6CTYfbmD7zg/jAPtDPhI/pbH5Eo
+eQSlIzf2WynI7YC4nNaPNUVlFCHGEcVeoPnkQyGltibVzCrx+RJVb+VYse2nw9vD
+iil1/TLYeBMEwKpHOWszYxg+tGwKfMM9ixSDlNv9B72psAT/FuXd6nAvu2AeZPxv
+2uKsEg2kz1kZWJ4PNYPobu0xr4XueEA3yoQsJUKDxqyS6WnmuwE60XC+SucOXvwv
+8XT4q7MPlzgrw0Vzxi2Kv0q6viXTt4/UEIJntyxlHUUh/5BjL+Dgnqdf2xx+8MrP
+XYYNdsJhB4lGao36FO+WJt5DJP20AA==
+=ux8V
 -----END PGP SIGNATURE-----

Reply via email to