Skip to main content
Mallory

Apache ActiveMQ and Artemis Flaws Enable Security Bypass and Multiple Attacks

internet-facing-service-vulnerabilitywidely-deployed-product-advisoryidentity-authentication-vulnerability
Updated April 24, 2026 at 11:01 AM4 sources
Share:
Apache ActiveMQ and Artemis Flaws Enable Security Bypass and Multiple Attacks

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

German authorities issued advisories for Apache ActiveMQ Artemis and Apache ActiveMQ Classic components after disclosing vulnerabilities that affect the broker, client, and web interfaces. One advisory warns that a flaw in Apache ActiveMQ Artemis can allow attackers to bypass security measures, raising the risk of unauthorized access or actions within affected messaging environments.

A separate advisory reports multiple vulnerabilities in Apache ActiveMQ across the Client, Broker, and Web components, indicating broader exposure for organizations using the messaging platform in enterprise integrations and application back ends. The notices identify the affected Apache messaging products as requiring prompt review and remediation to reduce the risk of compromise in systems that rely on ActiveMQ services.

Timeline

  1. Apr 24, 2026

    dCERT publishes advisory on multiple Apache ActiveMQ vulnerabilities

    dCERT issued Advisory 2026-1234 for Apache ActiveMQ covering multiple vulnerabilities. It was published as a new security notice separate from the earlier Apache ActiveMQ advisories already recorded.

  2. Apr 10, 2026

    dCERT publishes advisory on multiple Apache ActiveMQ vulnerabilities

    dCERT issued Advisory 2026-1018 for Apache ActiveMQ covering multiple vulnerabilities. The advisory was published as a new security notice separate from earlier Apache ActiveMQ advisories.

  3. Apr 8, 2026

    dCERT publishes advisory on multiple Apache ActiveMQ vulnerabilities

    dCERT issued Advisory 2026-0972 covering multiple vulnerabilities affecting Apache ActiveMQ Client, Broker, and Web components.

  4. Mar 23, 2026

    dCERT publishes advisory on Apache ActiveMQ Artemis security bypass flaw

    dCERT issued Advisory 2026-0799 for Apache ActiveMQ Artemis describing a vulnerability that allows bypassing security measures.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Entities

Related Stories

Apache ActiveMQ Flaws Enable Path Traversal and TLS DoS

Apache ActiveMQ Flaws Enable Path Traversal and TLS DoS

Apache disclosed two vulnerabilities affecting multiple **ActiveMQ** components, including Client, Broker, and bundled distributions. **CVE-2026-33227** is a low-severity pathname restriction flaw that lets an authenticated user manipulate a supplied `key` value to traverse the classpath in two cases: when creating a **STOMP** consumer and when browsing messages through the web console. Apache warned the issue could expose classpath resource loading and potentially be chained with another attack. The flaw affects the 5.x branch before **5.19.3** and the 6.x branch from **6.0.0** before **6.2.2**, but Apache said those initial fixes were incomplete on Windows because of path separator handling, and recommended upgrading instead to **5.19.4** or **6.2.3**. Apache also published **CVE-2026-39304**, an important denial-of-service flaw in ActiveMQ's **NIO SSL transports** caused by incorrect handling of **TLS 1.3 `KeyUpdate`** messages. A client can repeatedly trigger updates and exhaust broker memory in the SSL engine, causing out-of-memory crashes and service disruption. Apache added that related handshake handling is also broken for earlier TLS versions such as **TLS 1.2**, though those cases lead to hung connections rather than memory exhaustion. The DoS issue affects the 5.x branch before **5.19.4** and the 6.x branch from **6.0.0** before **6.2.4**; users are advised to upgrade to **5.19.5** or **6.2.4**.

3 weeks ago
Authentication Bypass in Apache Artemis Core Downstream Federation (CVE-2026-27446)

Authentication Bypass in Apache Artemis Core Downstream Federation (CVE-2026-27446)

**CVE-2026-27446** is a critical *missing authentication for a critical function* (CWE-306) in **Apache Artemis** and **Apache ActiveMQ Artemis** that enables an unauthenticated remote attacker to abuse the **Core protocol** to force a target broker to establish an outbound Core downstream federation connection to an attacker-controlled rogue broker. If successful, the attacker can **inject arbitrary messages into any queue** and/or **exfiltrate messages from any queue** via the rogue broker, particularly in environments that allow **incoming Core protocol connections from untrusted sources** and **outgoing Core protocol connections to untrusted destinations**. Impacted versions include **Apache Artemis 2.50.0–2.51.0** and **Apache ActiveMQ Artemis 2.11.0–2.44.0**; upgrading to **Apache Artemis 2.52.0** is recommended to remediate. Mitigations include removing Core protocol support from untrusted-facing acceptors (notably the default `artemis` acceptor on port `61616` if configured to allow Core) or enforcing **two-way TLS (mTLS)** to require certificate-based client authentication before protocol negotiation. The Centre for Cybersecurity Belgium highlighted the high severity (reported as **CVSS 9.3**) and noted no vendor warning of active exploitation as of early March 2026, while emphasizing that **ActiveMQ-family products have been repeatedly targeted historically** for follow-on activity such as ransomware deployment.

1 months ago
Apache ActiveMQ Jolokia MBean Flaw Enables Authenticated RCE

Apache ActiveMQ Jolokia MBean Flaw Enables Authenticated RCE

Apache disclosed **CVE-2026-34197**, an important-severity remote code execution flaw in **Apache ActiveMQ Broker** and **Apache ActiveMQ Classic** that lets authenticated users execute code through the Jolokia JMX-HTTP bridge exposed at `/api/jolokia/`. The default Jolokia access policy permits `exec` operations on ActiveMQ MBeans, allowing attackers to call methods such as `BrokerService.addNetworkConnector(String)` and `BrokerService.addConnector(String)` with a crafted discovery URI. The exploit abuses the VM transport `brokerConfig` parameter to load a remote Spring XML application context via `ResourceXmlApplicationContext`, and Spring may instantiate singleton beans before ActiveMQ validates the configuration, enabling arbitrary code execution in the broker JVM, including through methods like `Runtime.exec()`. Apache said the issue affects versions before **5.19.4** in the 5.x line and **6.0.0 through before 6.2.3** in the 6.x line, and recommends upgrading to **5.19.5** or **6.2.3**; the vulnerability was reported by Naveen Sunkavally of Horizon3.ai.

1 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.

Apache ActiveMQ and Artemis Flaws Enable Security Bypass and Multiple Attacks | Mallory