Cyber Posture

CVE-2026-34197

HighCISA KEVActive Exploitation

Published: 07 April 2026

Published
07 April 2026
Modified
16 April 2026
KEV Added
16 April 2026
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.6667 98.6th percentile
Risk Priority 78 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.

Security Summary

CVE-2026-34197 is an improper input validation and code injection vulnerability (CWE-20, CWE-94) affecting Apache ActiveMQ Broker, Apache ActiveMQ All, and Apache ActiveMQ. The issue arises in the Jolokia JMX-HTTP bridge exposed at /api/jolokia/ on the web console, where the default access policy allows exec operations on all ActiveMQ MBeans (org.apache.activemq:*), including BrokerService.addNetworkConnector(String) and BrokerService.addConnector(String). An attacker can supply a crafted discovery URI that causes the VM transport's brokerConfig parameter to load a remote Spring XML application context via ResourceXmlApplicationContext. This context instantiates singleton beans prior to BrokerService configuration validation, enabling arbitrary code execution on the broker's JVM through bean factory methods such as Runtime.exec(). The vulnerability impacts Apache ActiveMQ Broker versions before 5.19.4 and from 6.0.0 before 6.2.3, with the same version ranges affected for Apache ActiveMQ All and Apache ActiveMQ.

An authenticated attacker with low privileges (PR:L) can exploit this over the network (AV:N) with low complexity (AC:L) and no user interaction (UI:N), achieving high confidentiality, integrity, and availability impact (CVSS 8.8). By invoking the vulnerable MBean operations via the Jolokia bridge, the attacker crafts a discovery URI to trigger remote loading and instantiation of a malicious Spring XML context, resulting in remote code execution within the broker's JVM.

The Apache security advisory recommends upgrading to Apache ActiveMQ versions 5.19.4 or 6.2.3, which address the issue by fixing the vulnerability. Additional details are available in the official announcement and related oss-security mailing list post.

This CVE appears in the CISA Known Exploited Vulnerabilities catalog, indicating active real-world exploitation.

Details

CWE(s)
CWE-20CWE-94
KEV Date Added
16 April 2026

Affected Products

apache
activemq
≤ 5.19.4 · 6.0.0 — 6.2.3
apache
activemq broker
≤ 5.19.4 · 6.0.0 — 6.2.3

MITRE ATT&CK Enterprise Techniques

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Vulnerability in exposed Jolokia JMX-HTTP bridge on ActiveMQ web console enables authenticated attackers to achieve remote code execution via crafted MBean operations and Spring XML context loading, directly facilitating exploitation of a public-facing application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References