Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2824 articles · 106996 vulns · 38/41 feeds (7d)
← Back to list
8.8
CVE-2026-34197EXPLOITEDPATCHED
apache software foundation · apache activemq broker

Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ: Authenticated users could perform RCE via Jolokia MBeans

Description

Security researchers discovered a remote code execution (RCE) vulnerability in Apache ActiveMQ Classic that has gone undetected for 13 years and could be exploited to execute arbitrary commands. The flaw was uncovered using the Claude AI assistant, which identified an exploit path by analyzing how independently developed components interact. Tracked as CVE-2026-34197, the security issue received a high severity score of 8.8 and affects versions of Apache ActiveMQ/Broker before 5.19.4, and all versions from 6.0.0 up to 6.2.3. This is also the reason why it was missed for more than a decade. Apache ActiveMQ is an open-source message broker written in Java that handles asynchronous communication via message queues or topics. Although ActiveMQ has released a newer ‘Artemis’ branch with better performance, the ‘Classic’ edition impacted by CVE-2026-34197 is widely deployed in enterprise, web backends, government, and company systems built on Java. Horizon3 researcher Naveen Sunkavally found the issue 'with nothing more than a couple of basic prompts' in Claude. 'This was 80% Claude with 20% gift-wrapping by a human,' he said. Sunkavally notes that Claude pointed to the issue after examining multiple individual components (Jolokia, JMX, network connectors, and VM transports). 'Each feature in isolation does what it’s supposed to, but they were dangerous together. This is exactly where Claude shone - efficiently stitching together this path end to end with a clear head free of assumptions.' The researcher reported the vulnerability to Apache maintainers on March 22, and the developer addressed it on March 30 in ActiveMQ Classic versions 6.2.3 and 5.19.4. A report from Horizon3 explains that the flaw stems from ActiveMQ’s Jolokia management API exposing a broker function (addNetworkConnector) that can be abused to load external configurations. By sending a specially crafted request, an attacker can force the broker to fetch a remote Spring XML file and execute arbitrary system commands during its initialization. The issue requires authentication via Jolokia, but becomes unauthenticated on versions 6.0.0 through 6.1.1 due to a separate bug, CVE-2024-32114, which exposes the API without access control. Unauthenticated RCE on specific ActiveMQ versions.

Affected Products

VendorProductVersions
apache software foundationapache activemq broker0, 6.0.0, 0, 6.0.0, 0, 6.0.0

References

  • https://activemq.apache.org/security-advisories.data/CVE-2026-34197-announcement.txt(vendor-advisory)

Related News (6 articles)

Tier B
CCCS Canada2h ago
Apache ActiveMQ security advisory (AV26-330)
→ No new info (linked only)
Tier D
BleepingComputer4h ago
13-year-old bug in ActiveMQ lets hackers remotely execute commands
→ No new info (linked only)
Tier D
Infosecurity Magazine12h ago
Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years
→ No new info (linked only)
Tier E
Reddit r/netsec1d ago
CVE-2026-34197: ActiveMQ RCE via Jolokia API
→ No new info (linked only)
Tier C
VulDB2d ago
CVE-2026-34197 | Apache ActiveMQ Broker/ActiveMQ Jolokia MBeans Remote Code Execution
→ No new info (linked only)
Tier C
oss-security2d ago
CVE-2026-34197: Apache ActiveMQ Broker, Apache ActiveMQ: Authenticated users could perform RCE via Jolokia MBeans
→ No new info (linked only)
CVSS 3.18.8 HIGH
CISA KEV❌ No
Actively exploited✅ Yes
Patch available
5.19.46.2.3
CWECWE-20, CWE-94, CWE-287
PublishedApr 7, 2026
Last enriched2h agov4
Tags
RCEApache ActiveMQCVE-2026-34197
Trending Score78
Source articles6
Independent6
Info Completeness10/14
Missing: epss, kev, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

HIGHCVE-2026-27314EXP
Apache Cassandra: Privilege escalation via ADD IDENTITY authorization bypass
Trending: 64
HIGHCVE-2026-35554
Apache Kafka Clients: Kafka Producer Message Corruption and Misrouting via Buffer Pool Race Condition
Trending: 41
MEDIUMCVE-2026-27315
Apache Cassandra: cqlsh history sensitive information leak
Trending: 31
MEDIUMCVE-2026-33227
Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ Web, Apache ActiveMQ: Improper Limitation of a Pathname to a Restricted Classpath Directory
Trending: 30
LOWCVE-2026-32588
Apache Cassandra: Authenticated DoS via ALTER ROLE Password Hashing
Trending: 29

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 7, 2026
Discovered by ZDM
Apr 7, 2026
Updated: description, cweIds, tags
Apr 8, 2026
Actively Exploited
Apr 8, 2026
Exploit Available
Apr 8, 2026
Patch Available
Apr 8, 2026
Updated: description, cweIds, tags
Apr 8, 2026
Updated: severity, activelyExploited
Apr 8, 2026

Version History

v4
Last enriched 2h ago
v4Tier B2h ago

Updated severity from NONE to HIGH and marked the vulnerability as actively exploited.

severityactivelyExploited
via CCCS Canada
v3Tier D3h ago

Updated description with new technical details, changed severity to HIGH, confirmed CVSS score of 8.8, added new CWE ID, marked as actively exploited, and included new IoCs and tags.

descriptioncweIdstags
via BleepingComputer
v2Tier D11h ago

Updated description with new technical details, changed severity to HIGH, added new CWEs, and included new IoCs and MITRE ATT&CK technique T1203.

descriptioncweIdstags
via Infosecurity Magazine
v11d ago

Initial creation