A flaw was found in camel-infinispan. This vulnerability involves unsafe deserialization in the ProtoStream remote aggregation repository. A remote attacker with low privileges could exploit this by sending specially crafted data, leading to arbitrary code execution. This allows the attacker to gain full control over the affected system, impacting its confidentiality, integrity, and availability.
Metrics
Affected Vendors & Products
References
History
Thu, 23 Apr 2026 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Wed, 22 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in camel-infinispan. This vulnerability involves unsafe deserialization in the ProtoStream remote aggregation repository. A remote attacker with low privileges could exploit this by sending specially crafted data, leading to arbitrary code execution. This allows the attacker to gain full control over the affected system, impacting its confidentiality, integrity, and availability. | |
| Title | Camel-infinispan: camel-infinispan: remote code execution via unsafe deserialization | |
| First Time appeared |
Redhat
Redhat camel Quarkus Redhat camel Spring Boot Redhat jboss Enterprise Application Platform Redhat jboss Fuse Redhat jbosseapxp |
|
| Weaknesses | CWE-502 | |
| CPEs | cpe:/a:redhat:camel_quarkus:3 cpe:/a:redhat:camel_spring_boot:4 cpe:/a:redhat:jboss_enterprise_application_platform:8 cpe:/a:redhat:jboss_fuse:7 cpe:/a:redhat:jbosseapxp |
|
| Vendors & Products |
Redhat
Redhat camel Quarkus Redhat camel Spring Boot Redhat jboss Enterprise Application Platform Redhat jboss Fuse Redhat jbosseapxp |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2026-04-22T13:34:30.098Z
Reserved: 2026-04-22T12:43:14.958Z
Link: CVE-2026-6857
Updated: 2026-04-22T13:34:22.726Z
Status : Awaiting Analysis
Published: 2026-04-22T13:16:22.583
Modified: 2026-04-22T21:23:52.620
Link: CVE-2026-6857
OpenCVE Enrichment
Updated: 2026-04-22T19:30:24Z