<Vulnerability name="CVE-2026-40048">
    <DocumentDistribution xml:lang="en">Copyright © 2012 Red Hat, Inc. All rights reserved.</DocumentDistribution>
    <ThreatSeverity>Important</ThreatSeverity>
    <PublicDate>2026-04-27T07:53:54</PublicDate>
    <Bugzilla id="2463176" url="https://bugzilla.redhat.com/show_bug.cgi?id=2463176" xml:lang="en:us">
Apache Camel: Apache Camel: Arbitrary code execution via insecure deserialization of crafted key files
    </Bugzilla>
    <CVSS3 status="draft">
        <CVSS3BaseScore>7.8</CVSS3BaseScore>
        <CVSS3ScoringVector>CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H</CVSS3ScoringVector>
    </CVSS3>
    <CWE>CWE-502</CWE>
    <Details xml:lang="en:us" source="Red Hat">
A flaw was found in Apache Camel. The FileBasedKeyLifecycleManager class deserializes key files without proper validation, allowing an attacker who can write to the key directory to place a specially crafted serialized Java object. When this object is deserialized during normal key operations, it can lead to arbitrary code execution within the application. This vulnerability stems from insecure deserialization of untrusted data.
    </Details>
    <PackageState cpe="cpe:/a:redhat:camel_spring_boot:4">
        <ProductName>Red Hat build of Apache Camel for Spring Boot 4</ProductName>
        <FixState>Not affected</FixState>
        <PackageName>camel-pqc</PackageName>
    </PackageState>
    <References xml:lang="en:us">
https://www.cve.org/CVERecord?id=CVE-2026-40048
https://nvd.nist.gov/vuln/detail/CVE-2026-40048
http://www.openwall.com/lists/oss-security/2026/04/26/6
https://camel.apache.org/security/CVE-2026-40048.html
    </References>
</Vulnerability>