CVE-2026-40466
Gravedad CVSS v3.1:
ALTA
Tipo:
CWE-20
Validación incorrecta de entrada
Fecha de publicación:
24/04/2026
Última modificación:
27/04/2026
Descripción
*** Pendiente de traducción *** Improper Input Validation, Improper Control of Generation of Code (&#39;Code Injection&#39;) vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ.<br />
<br />
<br />
<br />
An authenticated attacker may bypass the fix in CVE-2026-34197 by adding a connector using an HTTP Discovery transport via BrokerView.addNetworkConnector or BrokerView.addConnector through Jolokia if the activemq-http module is on the classpath.<br />
A malicious HTTP endpoint can return a VM transport through the HTTP URI which will bypass the validation added in CVE-2026-34197. The attacker can then use the VM transport&#39;s brokerConfig parameter to load a remote Spring XML application context using ResourceXmlApplicationContext.<br />
Because Spring&#39;s ResourceXmlApplicationContext instantiates all singleton beans before the BrokerService validates the configuration, arbitrary code execution occurs on the broker&#39;s JVM through bean factory methods such as Runtime.exec().<br />
<br />
<br />
This issue affects Apache ActiveMQ Broker: before 5.19.6, from 6.0.0 before 6.2.5; Apache ActiveMQ All: before 5.19.6, from 6.0.0 before 6.2.5; Apache ActiveMQ: before 5.19.6, from 6.0.0 before 6.2.5.<br />
<br />
Users are recommended to upgrade to version 5.19.6 or 6.2.5, which fixes the issue.
Impacto
Puntuación base 3.x
8.80
Gravedad 3.x
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:* | 5.19.6 (excluyendo) | |
| cpe:2.3:a:apache:activemq:*:*:*:*:*:*:*:* | 6.0.0 (incluyendo) | 6.2.5 (excluyendo) |
| cpe:2.3:a:apache:activemq_broker:*:*:*:*:*:*:*:* | 5.19.6 (excluyendo) | |
| cpe:2.3:a:apache:activemq_broker:*:*:*:*:*:*:*:* | 6.0.0 (incluyendo) | 6.2.5 (excluyendo) |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página



