Impact
Apache Camel’s Camel-Keycloak KeycloakSecurityPolicy fails to verify the issuer claim of JSON Web Tokens. As a result, a token issued by one Keycloak realm can be accepted by a policy configured for a different realm, breaking tenant isolation and allowing an attacker to impersonate a user from another realm. This flaw corresponds to CWE-346, a failure to validate token authenticity, and can lead to unauthorized access to protected resources.
Affected Systems
Apache Camel versions from 4.15.0 up to, but not including, 4.18.0 contain the vulnerability. These releases deploy the KeycloakSecurityPolicy without issuer validation.
Risk and Exploitability
The CVSS score of 9.1 indicates a critical impact on confidentiality, integrity, and availability with a high exploitation complexity. The EPSS score is less than 1%, suggesting a low current exploitation probability, and the vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote: an attacker can send a crafted HTTP request bearing a malicious JWT from another realm to any Camel route that uses the KeycloakSecurityPolicy, gaining unauthorized access behind the tenancy isolation layer.
OpenCVE Enrichment
Github GHSA