Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-w192-rjm3-a3g6
Vulnerability ID VCID-w192-rjm3-a3g6
Aliases CVE-2018-8041
GHSA-jv74-f9pj-xp3f
Summary Apache Camel's Mail 2.20.0 through 2.20.3, 2.21.0 through 2.21.1 and 2.22.0 is vulnerable to path traversal.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (4)
System Score Found at
cvssv3.1 5.3 http://camel.apache.org/security-advisories.data/CVE-2018-8041.txt.asc?version=1&modificationDate=1536746339000&api=v2
generic_textual MODERATE http://camel.apache.org/security-advisories.data/CVE-2018-8041.txt.asc?version=1&modificationDate=1536746339000&api=v2
cvssv3.1 5.3 https://access.redhat.com/errata/RHSA-2018:3768
generic_textual MODERATE https://access.redhat.com/errata/RHSA-2018:3768
cvssv3 6.3 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8041.json
epss 0.02474 https://api.first.org/data/v1/epss?cve=CVE-2018-8041
epss 0.02474 https://api.first.org/data/v1/epss?cve=CVE-2018-8041
epss 0.02474 https://api.first.org/data/v1/epss?cve=CVE-2018-8041
epss 0.02474 https://api.first.org/data/v1/epss?cve=CVE-2018-8041
epss 0.02474 https://api.first.org/data/v1/epss?cve=CVE-2018-8041
epss 0.02474 https://api.first.org/data/v1/epss?cve=CVE-2018-8041
epss 0.02474 https://api.first.org/data/v1/epss?cve=CVE-2018-8041
epss 0.02474 https://api.first.org/data/v1/epss?cve=CVE-2018-8041
epss 0.02474 https://api.first.org/data/v1/epss?cve=CVE-2018-8041
epss 0.02474 https://api.first.org/data/v1/epss?cve=CVE-2018-8041
epss 0.02474 https://api.first.org/data/v1/epss?cve=CVE-2018-8041
epss 0.02474 https://api.first.org/data/v1/epss?cve=CVE-2018-8041
epss 0.02474 https://api.first.org/data/v1/epss?cve=CVE-2018-8041
epss 0.02474 https://api.first.org/data/v1/epss?cve=CVE-2018-8041
epss 0.02474 https://api.first.org/data/v1/epss?cve=CVE-2018-8041
cvssv3.1 5.3 https://github.com/advisories/GHSA-jv74-f9pj-xp3f
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-jv74-f9pj-xp3f
generic_textual MODERATE https://github.com/advisories/GHSA-jv74-f9pj-xp3f
cvssv3.1 5.3 https://github.com/apache/camel
generic_textual MODERATE https://github.com/apache/camel
cvssv3.1 5.3 https://github.com/apache/camel/commit/4580e4d6c65cfd544c1791c824b5819477c583cc
generic_textual MODERATE https://github.com/apache/camel/commit/4580e4d6c65cfd544c1791c824b5819477c583cc
cvssv3.1 5.3 https://github.com/apache/camel/commit/4f401c09d22c45c94fa97746dc31905e06b19e3
generic_textual MODERATE https://github.com/apache/camel/commit/4f401c09d22c45c94fa97746dc31905e06b19e3
cvssv3.1 5.3 https://github.com/apache/camel/commit/63c7c080de4d18f9ceb25843508710df2c2c6d4
generic_textual MODERATE https://github.com/apache/camel/commit/63c7c080de4d18f9ceb25843508710df2c2c6d4
cvssv3.1 5.3 https://github.com/apache/camel/commit/a0d25d9582c6ee85e9567fa39413df0b4f02ef7
generic_textual MODERATE https://github.com/apache/camel/commit/a0d25d9582c6ee85e9567fa39413df0b4f02ef7
cvssv3.1 5.3 https://issues.apache.org/jira/browse/CAMEL-12630
generic_textual MODERATE https://issues.apache.org/jira/browse/CAMEL-12630
cvssv3.1 5.3 https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E
cvssv3.1 5.3 https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E
cvssv3.1 5.3 https://nvd.nist.gov/vuln/detail/CVE-2018-8041
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2018-8041
cvssv3.1 5.3 http://www.securityfocus.com/bid/105352
generic_textual MODERATE http://www.securityfocus.com/bid/105352
No exploits are available.
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at http://camel.apache.org/security-advisories.data/CVE-2018-8041.txt.asc?version=1&modificationDate=1536746339000&api=v2
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://access.redhat.com/errata/RHSA-2018:3768
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2018-8041.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/advisories/GHSA-jv74-f9pj-xp3f
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/apache/camel
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/apache/camel/commit/4580e4d6c65cfd544c1791c824b5819477c583cc
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/apache/camel/commit/4f401c09d22c45c94fa97746dc31905e06b19e3
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/apache/camel/commit/63c7c080de4d18f9ceb25843508710df2c2c6d4
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://github.com/apache/camel/commit/a0d25d9582c6ee85e9567fa39413df0b4f02ef7
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://issues.apache.org/jira/browse/CAMEL-12630
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://lists.apache.org/thread.html/2318d7f7d87724d8716cd650c21b31cb06e4d34f6d0f5ee42f28fdaf@%3Ccommits.camel.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://lists.apache.org/thread.html/b4014ea7c5830ca1fc28edd5cafedfe93ad4af2d9e69c961c5def31d@%3Ccommits.camel.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2018-8041
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N Found at http://www.securityfocus.com/bid/105352
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.85203
EPSS Score 0.02474
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:38:16.560046+00:00 ProjectKB MSRImporter Import https://raw.githubusercontent.com/SAP/project-kb/master/MSR2019/dataset/vulas_db_msr2019_release.csv 38.0.0