Unauthenticated RCE Vulnerability in Apache ActiveMQ Classic via Jolokia API (CVE-2026-34197)
Updated: 08.04.2026 20:26
· First: 08.04.2026 12:15
· 📰 2 src / 2 articles
A high-severity unauthenticated remote code execution (RCE) vulnerability (CVE-2026-34197) was discovered in Apache ActiveMQ Classic, affecting versions prior to 5.19.4 and all versions from 6.0.0 to 6.2.3. The flaw permits attackers to execute arbitrary OS commands by abusing the Jolokia management API's addNetworkConnector function to fetch remote Spring XML files during broker initialization. Researchers uncovered the vulnerability using Anthropic’s Claude AI, which identified 80% of the exploit path in approximately 10 minutes with minimal human input. Horizon3’s Naveen Sunkavally reported the issue to Apache on March 22, 2026, and it was patched on March 30, 2026. Exploitation indicators include ActiveMQ broker logs showing internal VM transport connections with brokerConfig=xbean:http:// query parameters and warnings about configuration problems indicating payload execution. The flaw builds on a prior issue (CVE-2024-32114), which removed authentication requirements in versions 6.0.0-6.1.1, while other versions require default credentials (admin:admin). Despite the availability of the newer Artemis branch, ActiveMQ Classic remains widely deployed in enterprise, web backends, government, and Java-based corporate systems.