Fixing and finding
Jump to remediation plan
CVE ID

CVE-2026-34197

Published 2026-04-07
Updated 23 days ago
Vendor/s
Apache
Product/s
ActiveMQ
Version/s
* > 5.19.4
KEV Status
Active Exploitation
Listed in CISA's Known Exploited Vulnerabilities catalogue. Active exploitation observed in the wild.
CVSS Score (v3.1)
8.8
/ 10
High
Severity Details
Base score
8.8 High
Attack vector
Network
Attack complexity
Low
Privileges required
Low
User interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Description

CVE-2026-34197 is a high-severity RCE vulnerability in Apache ActiveMQ. Patch immediately to versions 5.19.4 or 6.2.3 to prevent remote code injection.

CPE

Apache logo
Apache
Product Version Start Version End (excl.) Status
activemq * 5.19.4 vulnerable
activemq 6.0.0 6.2.3 vulnerable
activemq_broker * 5.19.4 vulnerable
activemq_broker 6.0.0 6.2.3 vulnerable

Related weakness (CWE)

CWE-20, CWE-94

Remediation plan

1

Apply official patches

Upgrade to Apache ActiveMQ version 5.19.4 or 6.2.3 immediately to address the improper input validation in the Jolokia bridge and prevent unauthorized code execution.

2

Update affected systems

Identify and update all instances of ActiveMQ Broker and ActiveMQ Classic running versions prior to 5.19.4 or versions between 6.0.0 and 6.2.2 to the latest secure releases.

3

Restrict access

Limit access to the /api/jolokia/ endpoint and the web console to trusted internal networks only, and enforce strict multi-factor authentication to prevent unauthorized JMX operations.

4

Monitor for exploitation

Review Jolokia logs for unusual exec operations on BrokerService MBeans and inspect network traffic for outbound connections from the broker to unknown remote Spring XML resources.

Detection Guidance

Monitor web console logs for HTTP POST requests to the /api/jolokia/ endpoint containing addNetworkConnector or addConnector operations. Look for suspicious discovery URIs pointing to external XML files or remote hosts. Additionally, use network security monitoring to detect unauthorized outbound connections from the ActiveMQ broker to external IP addresses, which may indicate the retrieval of a malicious Spring configuration context.

References

Sources

NIST National Vulnerability Database (NVD)
CISA Known Exploited Vulnerabilities (KEV)

Experience superior visibility and a simpler approach to cyber risk management