CVE-2026-34197

HIGH KEV NUCLEI LAB

Apache ActiveMQ Broker, Apache ActiveMQ: Authenticated users could perform RCE via Jolokia MBeans

Title source: cna

Description

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) and BrokerService.addConnector(String). An authenticated attacker can invoke these operations with a crafted discovery URI that triggers the VM transport's brokerConfig parameter to load a remote Spring XML application context using ResourceXmlApplicationContext. Because Spring's ResourceXmlApplicationContext instantiates all singleton beans before the BrokerService validates the configuration, arbitrary code execution occurs on the broker's JVM through bean factory methods such as Runtime.exec(). This issue affects Apache ActiveMQ Broker: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ All: before 5.19.4, from 6.0.0 before 6.2.3; Apache ActiveMQ: before 5.19.4, from 6.0.0 before 6.2.3. Users are recommended to upgrade to version 5.19.4 or 6.2.3, which fixes the issue

Exploits (10)

nomisec WORKING POC 2 stars
by dinosn · poc
https://github.com/dinosn/CVE-2026-34197
nomisec WORKING POC 1 stars
by Catherines77 · poc
https://github.com/Catherines77/ActiveMQ-EXPtools
nomisec WORKING POC 1 stars
by xshysjhq · remote
https://github.com/xshysjhq/CVE-2026-34197-payload-Apache-ActiveMQ-
nomisec SCANNER
by keraattin · poc
https://github.com/keraattin/CVE-2026-34197
nomisec WORKING POC
by hg0434hongzh0 · poc
https://github.com/hg0434hongzh0/CVE-2026-34197
nomisec WORKING POC
by KONDORDEVSECURITYCORP · poc
https://github.com/KONDORDEVSECURITYCORP/CVE-2026-34197
nomisec WORKING POC
by AtoposX-J · poc
https://github.com/AtoposX-J/CVE-2026-34197-Apache-ActiveMQ-RCE
nomisec WORKING POC
by DEVSECURITYSPRO · poc
https://github.com/DEVSECURITYSPRO/CVE-2026-34197
nomisec WRITEUP
by 0xBlackash · poc
https://github.com/0xBlackash/CVE-2026-34197

Nuclei Templates (1)

Apache ActiveMQ - Remote Code Execution
CRITICALVERIFIEDby DhiyaneshDk,horizon3
Shodan: title:"ActiveMQ" port:8161
FOFA: title="ActiveMQ" && port="8161"

Scores

CVSS v3 8.8
EPSS 0.5942
EPSS Percentile 98.3%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Lab Environment

COMMUNITY
Community Lab
docker pull apache/activemq-classic:5.18.6
+7 more repos

Details

CISA KEV 2026-04-16
VulnCheck KEV 2026-04-16
ENISA EUVD EUVD-2026-19588
CWE
CWE-20 CWE-94
Status published
Products (10)
apache/activemq < 5.19.4
apache/activemq_broker < 5.19.4
Apache Software Foundation/Apache ActiveMQ < 5.19.4
Apache Software Foundation/Apache ActiveMQ 6.0.0 - 6.2.3
Apache Software Foundation/Apache ActiveMQ All < 5.19.4
Apache Software Foundation/Apache ActiveMQ All 6.0.0 - 6.2.3
Apache Software Foundation/Apache ActiveMQ Broker < 5.19.4
Apache Software Foundation/Apache ActiveMQ Broker 6.0.0 - 6.2.3
org.apache.activemq/activemq-all 0 - 5.19.5Maven
org.apache.activemq/activemq-broker 0 - 5.19.5Maven
Published Apr 07, 2026
KEV Added Apr 16, 2026
Tracked Since Apr 07, 2026