Severity: important
Affected versions:
- Apache ActiveMQ (org.apache.activemq:apache-activemq) before 5.19.6
- Apache ActiveMQ (org.apache.activemq:apache-activemq) 6.0.0 before 6.2.5
- Apache ActiveMQ Broker (org.apache.activemq:activemq-broker) before 5.19.6
- Apache ActiveMQ Broker (org.apache.activemq:activemq-broker) 6.0.0 before
6.2.5
- Apache ActiveMQ All (org.apache.activemq:activemq-all) before 5.19.6
- Apache ActiveMQ All (org.apache.activemq:activemq-all) 6.0.0 before 6.2.5
Description:
Improper Input Validation, Improper Control of Generation of Code ('Code
Injection') vulnerability in Apache ActiveMQ, Apache ActiveMQ Broker, Apache
ActiveMQ All.
An authenticated attacker can use the admin web console page to construct a
malicious broker name that bypasses name validation to include an xbean binding
that can be later used by a VM transport to load a remote Spring XML
application.
The attacker can then use the DestinationView mbean to send a message to
trigger a VM transport creation that will reference this malicious broker name
which can lead to loading the malicious Spring XML context file.
Because Spring's ResourceXmlApplicationContext instantiates all singleton beans
before the BrokerService validates the configuration, arbitrary code execution
occurs on the broker's JVM through bean factory methods such as Runtime.exec().
This issue affects Apache ActiveMQ: before 5.19.6, from 6.0.0 before 6.2.5;
Apache ActiveMQ Broker: before 5.19.6, from 6.0.0 before 6.2.5; Apache ActiveMQ
All: before 5.19.6, from 6.0.0 before 6.2.5.
Users are recommended to upgrade to version 6.2.5 or 5.19.6, which fixes the
issue.
Credit:
jsjcw (finder)
References:
https://activemq.apache.org/
https://www.cve.org/CVERecord?id=CVE-2026-41044
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]
For further information, visit: https://activemq.apache.org/contact