Camel K Red Hat Camel K

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Red Hat Camel K.

Recent Red Hat Camel K Security Advisories

Advisory Title Published
RHSA-2025:3540 (RHSA-2025:3540) Important: Red Hat Integration Camel K 1.10.10 release and security update. April 2, 2025
RHSA-2025:1154 (RHSA-2025:1154) Important: Red Hat Integration Camel K 1.10.9 release and security update. February 6, 2025
RHSA-2024:8339 (RHSA-2024:8339) Important: Red Hat Integration Camel K 1.10.8 release and security update. October 22, 2024
RHSA-2024:0148 (RHSA-2024:0148) Important: Red Hat Integration Camel K 1.10.5 release and security update January 10, 2024
RHSA-2023:6117 (RHSA-2023:6117) Important: Red Hat Integration Camel K 1.10.4 release and security update October 25, 2023
RHSA-2023:5337 (RHSA-2023:5337) Important: Red Hat Integration Camel K 1.10.2 release security update September 21, 2023
RHSA-2023:3906 (RHSA-2023:3906) Important: Red Hat Integration Camel K 1.10.1 release security update June 28, 2023

By the Year

In 2026 there have been 0 vulnerabilities in Red Hat Camel K. Camel K did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 1 8.10

It may take a day or so for new Camel K vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Red Hat Camel K Security Vulnerabilities

Quarkus HTTP Security Policy Bypass via Unsanitized Character Permutations
CVE-2023-4853 8.1 - High - September 20, 2023

A flaw was found in Quarkus where HTTP security policies are not sanitizing certain character permutations correctly when accepting requests, resulting in incorrect evaluation of permissions. This issue could allow an attacker to bypass the security policy altogether, resulting in unauthorized endpoint access and possibly a denial of service.

Improper Neutralization of Input Leaders

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Red Hat Camel K or by Red Hat? Click the Watch button to subscribe.

Red Hat
Vendor

subscribe