High (8.8) Actively Exploited

ActiveMQ RCE exploited in the wild (CVE-2026-34197) [PoC]

CVE-2026-34197

Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bri...

Affected: Apache Activemq Apache Activemq Apache Activemq Broker Apache Activemq Broker

Overview

A critical vulnerability in Apache ActiveMQ Classic allows authenticated attackers to execute arbitrary code on the broker server. This flaw, tracked as CVE-2026-34197, is being actively exploited in the wild, necessitating urgent action.

Vulnerability Details

The vulnerability stems from two issues in the ActiveMQ web console. First, the integrated Jolokia JMX-HTTP bridge, accessible at the /api/jolokia/ endpoint, has a default access policy that permits “exec” operations on critical broker management beans. Second, there is improper input validation in certain broker functions that an attacker can leverage.

An authenticated attacker can exploit this by sending a crafted request that tricks the broker into loading a malicious Spring XML configuration file from a remote, attacker-controlled server. This configuration file can contain instructions that force the broker to execute arbitrary operating system commands on the underlying host with the privileges of the ActiveMQ Java process.

Affected Versions

This issue affects the following Apache ActiveMQ Classic versions:

  • Versions before 5.19.4
  • Versions from 6.0.0 before 6.2.3

Impact

Successful exploitation results in full Remote Code Execution (RCE) on the ActiveMQ broker host. This gives an attacker the ability to install malware, exfiltrate data, pivot to other systems on the network, or cripple the messaging service. Given that this vulnerability is listed in CISA’s Known Exploited Vulnerabilities (KEV) catalog, organizations must assume attackers are already using it to compromise systems.

Remediation and Mitigation

The primary and definitive solution is to upgrade your ActiveMQ installation immediately.

  • Upgrade to Apache ActiveMQ Classic version 5.19.4 or 6.2.3.

If immediate upgrade is not possible, apply the following mitigations:

  1. Restrict Network Access: Ensure the ActiveMQ web console (including the /api/jolokia/ endpoint) is not exposed to untrusted networks, especially the internet. Use firewall rules or network segmentation.
  2. Harden Jolokia Access: Modify the Jolokia access policy (jolokia-access.xml) to explicitly deny “exec” operations or restrict access to trusted IP addresses only. Refer to the official Apache advisory for specific configuration guidance.
  3. Monitor for Compromise: Actively review broker logs for suspicious activity and monitor systems for unexpected processes or network connections, as this vulnerability is actively exploited. For more on the tactics of threat actors, you can review recent breach reports.

Security Insight

This vulnerability highlights the persistent risk of exposed management interfaces, a pattern seen in incidents like the Log4Shell exploitation chain. The default permissive policy in Jolokia, combined with a code injection path in a core broker function, created a potent RCE vector. It underscores that for middleware like message brokers, hardening default configurations of auxiliary services is as critical as securing the primary application logic. For the latest on such threats, follow our security news coverage.

Further Reading

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Public PoC References

Unverified third-party code

These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).

Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.

Repository Stars
dinosn/CVE-2026-34197

CVE-2026-34197 activemq PoC

★ 6
DEVSECURITYSPRO/CVE-2026-34197

CVE-2026-34197 - Apache ActiveMQ RCE via Jolokia Endpoint PoC

★ 3
KONDORDEVSECURITYCORP/CVE-2026-34197

CVE-2026-34197 — Apache ActiveMQ RCE via Jolokia API | PoC Exploit

★ 2
0xBlackash/CVE-2026-34197

CVE-2026-34197

★ 1
AtoposX-J/CVE-2026-34197-Apache-ActiveMQ-RCE

CVE-2026-34197

★ 1

Showing 5 of 6 known references. Source: nomi-sec/PoC-in-GitHub.

Nuclei Detection Templates

Detection template available — your exposure is being scanned

The templates below are YAML signatures for the Nuclei scanner from ProjectDiscovery. They are not exploit code — they are detection rules that confirm whether a target is vulnerable. The presence of a Nuclei template means every bug bounty hunter, AppSec team, red team, and reconnaissance pipeline on the public internet is actively probing for this CVE.

Assume your exposed instances have already been touched. Patch immediately even if no exploitation is observed yet — fingerprinting precedes exploitation by days at most.

Template Source
CVE-2026-34197.yaml View YAML

1 Nuclei template indexed for this CVE. Source: projectdiscovery/nuclei-templates.

Related Advisories

Related Across Yazoul

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.