ActiveMQ RCE exploited in the wild (CVE-2026-34197) [PoC]
CVE-2026-34197
Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ. Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bri...
Overview
A critical vulnerability in Apache ActiveMQ Classic allows authenticated attackers to execute arbitrary code on the broker server. This flaw, tracked as CVE-2026-34197, is being actively exploited in the wild, necessitating urgent action.
Vulnerability Details
The vulnerability stems from two issues in the ActiveMQ web console. First, the integrated Jolokia JMX-HTTP bridge, accessible at the /api/jolokia/ endpoint, has a default access policy that permits “exec” operations on critical broker management beans. Second, there is improper input validation in certain broker functions that an attacker can leverage.
An authenticated attacker can exploit this by sending a crafted request that tricks the broker into loading a malicious Spring XML configuration file from a remote, attacker-controlled server. This configuration file can contain instructions that force the broker to execute arbitrary operating system commands on the underlying host with the privileges of the ActiveMQ Java process.
Affected Versions
This issue affects the following Apache ActiveMQ Classic versions:
- Versions before 5.19.4
- Versions from 6.0.0 before 6.2.3
Impact
Successful exploitation results in full Remote Code Execution (RCE) on the ActiveMQ broker host. This gives an attacker the ability to install malware, exfiltrate data, pivot to other systems on the network, or cripple the messaging service. Given that this vulnerability is listed in CISA’s Known Exploited Vulnerabilities (KEV) catalog, organizations must assume attackers are already using it to compromise systems.
Remediation and Mitigation
The primary and definitive solution is to upgrade your ActiveMQ installation immediately.
- Upgrade to Apache ActiveMQ Classic version 5.19.4 or 6.2.3.
If immediate upgrade is not possible, apply the following mitigations:
- Restrict Network Access: Ensure the ActiveMQ web console (including the
/api/jolokia/endpoint) is not exposed to untrusted networks, especially the internet. Use firewall rules or network segmentation. - Harden Jolokia Access: Modify the Jolokia access policy (
jolokia-access.xml) to explicitly deny “exec” operations or restrict access to trusted IP addresses only. Refer to the official Apache advisory for specific configuration guidance. - Monitor for Compromise: Actively review broker logs for suspicious activity and monitor systems for unexpected processes or network connections, as this vulnerability is actively exploited. For more on the tactics of threat actors, you can review recent breach reports.
Security Insight
This vulnerability highlights the persistent risk of exposed management interfaces, a pattern seen in incidents like the Log4Shell exploitation chain. The default permissive policy in Jolokia, combined with a code injection path in a core broker function, created a potent RCE vector. It underscores that for middleware like message brokers, hardening default configurations of auxiliary services is as critical as securing the primary application logic. For the latest on such threats, follow our security news coverage.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Public PoC References
Unverified third-party code
These repositories are publicly listed on GitHub and have not been audited by Yazoul Security. They may contain malware, backdoors, destructive payloads, or operational security risks (telemetry, exfiltration). Treat them as hostile binaries. Inspect source before execution. Run only in isolated, disposable lab environments (offline VM, no credentials, no production data).
Authorized use only. This information is provided for defensive research, detection engineering, and patch validation. Using exploit code against systems you do not own or do not have explicit written permission to test is illegal in most jurisdictions and violates Yazoul's terms of use.
| Repository | Stars |
|---|---|
| dinosn/CVE-2026-34197 CVE-2026-34197 activemq PoC | ★ 6 |
| DEVSECURITYSPRO/CVE-2026-34197 CVE-2026-34197 - Apache ActiveMQ RCE via Jolokia Endpoint PoC | ★ 3 |
| KONDORDEVSECURITYCORP/CVE-2026-34197 CVE-2026-34197 — Apache ActiveMQ RCE via Jolokia API | PoC Exploit | ★ 2 |
| 0xBlackash/CVE-2026-34197 CVE-2026-34197 | ★ 1 |
| AtoposX-J/CVE-2026-34197-Apache-ActiveMQ-RCE CVE-2026-34197 | ★ 1 |
Showing 5 of 6 known references. Source: nomi-sec/PoC-in-GitHub.
Nuclei Detection Templates
Detection template available — your exposure is being scanned
The templates below are YAML signatures for the Nuclei scanner from ProjectDiscovery. They are not exploit code — they are detection rules that confirm whether a target is vulnerable. The presence of a Nuclei template means every bug bounty hunter, AppSec team, red team, and reconnaissance pipeline on the public internet is actively probing for this CVE.
Assume your exposed instances have already been touched. Patch immediately even if no exploitation is observed yet — fingerprinting precedes exploitation by days at most.
| Template | Source |
|---|---|
CVE-2026-34197.yaml | View YAML |
1 Nuclei template indexed for this CVE. Source: projectdiscovery/nuclei-templates.
Related Advisories
NuGet Gallery is a package repository that powers nuget.org. A security vulnerability exists in the NuGetGallery backend job’s handling of .nuspec files within NuGet packages. An attacker can supply a...
A weakness has been identified in FedML-AI FedML up to 0.8.9. Affected is the function sendMessage of the file grpc_server.py of the component gRPC server. Executing a manipulation can lead to deseria...
In modem, there is a possible improper input validation. This could lead to remote denial of service with no additional execution privileges needed.....
In nr modem, there is a possible system crash due to improper input validation. This could lead to remote denial of service with no additional execution privileges needed....