Arbitrary Code Injection Affecting org.apache.activemq:activemq-broker package, versions [,5.19.6)[6.0.0,6.2.5)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.11% (30th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHEACTIVEMQ-16323331
  • published30 Apr 2026
  • disclosed24 Apr 2026
  • creditjsjcw

Introduced: 24 Apr 2026

NewCVE-2026-41044  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade org.apache.activemq:activemq-broker to version 5.19.6, 6.2.5 or higher.

Overview

org.apache.activemq:activemq-broker is a high performance Apache 2.0 licensed Message Broker and JMS 1.1 implementation.

Affected versions of this package are vulnerable to Arbitrary Code Injection in the DestinationView MBean exposed by Jolokia. An attacker can achieve arbitrary code execution by crafting a malicious broker name that bypasses validation, embedding an xbean binding that is later used by a VM transport to load a remote Spring XML application. This allows the attacker to trigger the loading of a malicious Spring XML context file, resulting in the instantiation of arbitrary beans and execution of code on the broker's JVM through methods such as Runtime.exec().

CVSS Base Scores

version 4.0
version 3.1