Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2806 articles · 108988 vulns · 38/41 feeds (7d)
← Back to list
4.3
CVE-2026-33227PATCHED
apache software foundation · apache activemq client

Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ Web, Apache ActiveMQ: Improper Limitation of a Pathname to a Restricted Classpath Directory

Description

Improper validation and restriction of a classpath path name vulnerability in Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ Web, Apache ActiveMQ. In two instances (when creating a Stomp consumer and also browsing messages in the Web console) an authenticated user provided "key" value could be constructed to traverse the classpath due to path concatenation. As a result, the application is exposed to a classpath path resource loading vulnerability that could potentially be chained together with another attack to lead to exploit. This issue affects Apache ActiveMQ Client: before 5.19.3, from 6.0.0 before 6.2.2; Apache ActiveMQ Broker: before 5.19.3, from 6.0.0 before 6.2.2; Apache ActiveMQ All: before 5.19.3, from 6.0.0 before 6.2.2; Apache ActiveMQ Web: before 5.19.3, from 6.0.0 before 6.2.2; Apache ActiveMQ: before 5.19.3, from 6.0.0 before 6.2.2. Users are recommended to upgrade to version 5.19.4 or 6.2.3, which fixes the issue. Note: 5.19.3 and 6.2.2 also fix this issue, but that is limited to non-Windows environments due to a path separator resolution bug fixed in 5.19.4 and 6.2.3.

Affected Products

VendorProductVersions
apache software foundationapache activemq clientmaven/org.apache.activemq:activemq-client: < 5.19.3, maven/org.apache.activemq:activemq-client: >= 6.0.0, < 6.2.2, maven/org.apache.activemq:activemq-broker: < 5.19.3, maven/org.apache.activemq:activemq-broker: >= 6.0.0, < 6.2.2, maven/org.apache.activemq:activemq-all: < 5.19.3, maven/org.apache.activemq:activemq-all: >= 6.0.0, < 6.2.2, maven/org.apache.activemq:activemq-web: < 5.19.3, maven/org.apache.activemq:activemq-web: >= 6.0.0, < 6.2.2

Also Affects

Downstream vendors/products affected by this vulnerability

VendorProductSourceConfidence
mavenorg.apache.activemq:activemq-brokerGHSA85%
mavenorg.apache.activemq:activemq-clientGHSA85%
mavenorg.apache.activemq:activemq-webGHSA85%
mavenorg.apache.activemq:activemq-allGHSA85%

References

  • https://activemq.apache.org/security-advisories.data/CVE-2026-33227-announcement.txt(vendor-advisory)

Related News (2 articles)

Tier C
VulDB2d ago
CVE-2026-33227 | Apache ActiveMQ Client/ActiveMQ Broker/ActiveMQ path traversal
→ No new info (linked only)
Tier C
oss-security2d ago
CVE-2026-33227: Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ, Apache ActiveMQ Web: Improper Limitation of a Pathname to a Restricted Directory
→ No new info (linked only)
CVSS 3.14.3 MEDIUM
VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
CISA KEV❌ No
Actively exploited❌ No
Patch available
org.apache.activemq:activemq-client@5.19.3org.apache.activemq:activemq-client@6.2.2org.apache.activemq:activemq-broker@5.19.3org.apache.activemq:activemq-broker@6.2.2org.apache.activemq:activemq-all@5.19.3org.apache.activemq:activemq-all@6.2.2org.apache.activemq:activemq-web@5.19.3org.apache.activemq:activemq-web@6.2.2
CWECWE-22
PublishedApr 7, 2026
Last enriched1d ago
Trending Score29
Source articles2
Independent2
Info Completeness0/14
Missing: cve_id, title, description, vendor, product, versions, cvss, epss, cwe, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-34197EXP
Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ: Authenticated users could perform RCE via Jolokia MBeans
Trending: 77
HIGHCVE-2026-27314EXP
Apache Cassandra: Privilege escalation via ADD IDENTITY authorization bypass
Trending: 63
HIGHCVE-2026-35554
Apache Kafka Clients: Kafka Producer Message Corruption and Misrouting via Buffer Pool Race Condition
Trending: 40
MEDIUMCVE-2026-27315
Apache Cassandra: cqlsh history sensitive information leak
Trending: 31
LOWCVE-2026-32588
Apache Cassandra: Authenticated DoS via ALTER ROLE Password Hashing
Trending: 29

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 7, 2026
Discovered by ZDM
Apr 7, 2026
Patch Available
Apr 8, 2026