Unauthenticated RCE Vulnerability in Apache ActiveMQ Classic via Jolokia API (CVE-2026-34197)
Summary
Hide ▲
Show ▼
A high-severity unauthenticated remote code execution (RCE) vulnerability (CVE-2026-34197) was discovered in Apache ActiveMQ Classic, exposing message brokers to potential compromise for over a decade. The flaw permits attackers to execute arbitrary OS commands by abusing the Jolokia management API, either via default credentials (admin:admin) or through an unauthenticated vector in specific versions (6.0.0-6.1.1) due to a prior issue (CVE-2024-32114). Organizations running vulnerable versions must prioritize patching, as exploitation could lead to full broker compromise and downstream lateral movement in enterprise environments.
Timeline
-
08.04.2026 12:15 1 articles · 3h ago
Unauthenticated RCE in Apache ActiveMQ Classic via Jolokia API (CVE-2026-34197) identified
A critical unauthenticated RCE vulnerability (CVE-2026-34197) was disclosed in Apache ActiveMQ Classic, affecting versions prior to 5.19.4 and 6.2.3. The flaw leverages the Jolokia management API to execute arbitrary OS commands via remote configuration file retrieval. Exploitation is possible without credentials in versions 6.0.0-6.1.1 due to CVE-2024-32114, while other versions require default credentials. Patches and detection guidance have been issued to mitigate the risk of compromise.
Show sources
- Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years — www.infosecurity-magazine.com — 08.04.2026 12:15
Information Snippets
-
CVE-2026-34197 enables unauthenticated RCE in Apache ActiveMQ Classic when the Jolokia API is exposed, either via default credentials or due to CVE-2024-32114 (which removes authentication requirements in versions 6.0.0-6.1.1).
First reported: 08.04.2026 12:151 source, 1 articleShow sources
- Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years — www.infosecurity-magazine.com — 08.04.2026 12:15
-
The vulnerability chain involves invoking a management operation through the Jolokia API to fetch a remote configuration file and execute arbitrary OS commands on the underlying system.
First reported: 08.04.2026 12:151 source, 1 articleShow sources
- Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years — www.infosecurity-magazine.com — 08.04.2026 12:15
-
Patched versions include ActiveMQ Classic 5.19.4 and 6.2.3, with mitigation guidance to remove default credentials and monitor for exploitation indicators.
First reported: 08.04.2026 12:151 source, 1 articleShow sources
- Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years — www.infosecurity-magazine.com — 08.04.2026 12:15
-
Exploitation indicators include POST requests to /api/jolokia/ containing addNetworkConnector in the request body, outbound HTTP connections from the broker process to unexpected hosts, and unexpected child processes spawned by the Java process.
First reported: 08.04.2026 12:151 source, 1 articleShow sources
- Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years — www.infosecurity-magazine.com — 08.04.2026 12:15
-
Logs of particular interest show network connector activity referencing vm:// URIs with brokerConfig=xbean:http.
First reported: 08.04.2026 12:151 source, 1 articleShow sources
- Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years — www.infosecurity-magazine.com — 08.04.2026 12:15
-
The flaw was discovered with AI assistance, with Anthropic’s Claude credited for identifying 80% of the exploit path in approximately 10 minutes, compared to an estimated week of manual review.
First reported: 08.04.2026 12:151 source, 1 articleShow sources
- Claude Discovers Apache ActiveMQ Bug Hidden for 13 Years — www.infosecurity-magazine.com — 08.04.2026 12:15