CVE-2026-34197
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
07/04/2026
Last modified:
16/04/2026
Description
Improper Input Validation, Improper Control of Generation of Code (&#39;Code Injection&#39;) vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ.<br />
<br />
Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including<br />
BrokerService.addNetworkConnector(String) and BrokerService.addConnector(String).<br />
<br />
An authenticated attacker can invoke these operations with a crafted discovery URI that triggers the VM transport&#39;s brokerConfig parameter to load a remote Spring XML application context using ResourceXmlApplicationContext.<br />
Because Spring&#39;s ResourceXmlApplicationContext instantiates all singleton beans before the BrokerService validates the configuration, arbitrary code execution occurs on the broker&#39;s JVM through bean factory methods such as Runtime.exec().<br />
<br />
<br />
<br />
This issue affects Apache ActiveMQ Broker: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ All: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ: before 5.19.4, from 6.0.0 before 6.2.3.<br />
<br />
<br />
<br />
Users are recommended to upgrade to version 5.19.4 or 6.2.3, which fixes the issue
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:* | 5.19.4 (excluding) | |
| cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:* | 6.0.0 (including) | 6.2.3 (excluding) |
| cpe:2.3:a:apache:activemq_broker:*:*:*:*:*:*:*:* | 5.19.4 (excluding) | |
| cpe:2.3:a:apache:activemq_broker:*:*:*:*:*:*:*:* | 6.0.0 (including) | 6.2.3 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



