Forwarded from the National Cybersecurity Information Sharing and Analysis Center: Cybersecurity Alert NISAC-200-202604-00000011
[Content Description]
Researchers have discovered an Improper Input Validation and Code Injection vulnerability (CVE-2026-34197) in Apache ActiveMQ Classic. Because the Jolokia JMX-HTTP interface exposed by the Web Console allows the execution of certain operations and lacks input validation, a remote attacker who has already been authenticated can pass in malicious parameters and execute arbitrary code. This vulnerability has already been exploited by hackers; please confirm and patch it as soon as possible.
[Affected Platforms]
Apache ActiveMQ Broker versions prior to 5.19.4
Apache ActiveMQ Broker versions 6.0.0 to 6.2.3 (excluding 6.2.3)
Apache ActiveMQ versions prior to 5.19.4
Apache ActiveMQ versions 6.0.0 to 6.2.3 (excluding 6.2.3)
[Recommended Actions]
The official patch has been released. Please refer to the official instructions for updating. The URL is as follows: https://activemq.apache.org/security-advisories.data/CVE-2026-34197-announcement.txt
[References]
1. https://nvd.nist.gov/vuln/detail/CVE-2026-34197
2. https://activemq.apache.org/security-advisories.data/CVE-2026-34197-announcement.txt