Apache Software Foundation Apache Activemq vulnerabilities
14 known vulnerabilities affecting apache_software_foundation/apache_activemq.
Total CVEs
14
CISA KEV
1
actively exploited
Public exploits
5
Exploited in wild
1
Severity breakdown
CRITICAL1HIGH7MEDIUM5LOW1
Vulnerabilities
Page 1 of 1
CVE-2026-39304HIGHCVSS 7.5fixed in 5.19.4≥ 6.0.0, < 6.2.42026-04-10
CVE-2026-39304 [HIGH] CWE-400 CVE-2026-39304: Denial of Service via Out of Memory vulnerability in Apache ActiveMQ Client, Apache ActiveMQ Broker,
Denial of Service via Out of Memory vulnerability in Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ.
ActiveMQ NIO SSL transports do not correctly handle TLSv1.3 handshake KeyUpdates triggered by clients. This makes it possible for a client to rapidly trigger updates which causes the broker to exhaust all its memory in the SSL engine
cvelistv5nvd
CVE-2026-40046MEDIUMCVSS 5.4≥ 6.0.0, < 6.2.42026-04-09
CVE-2026-40046 [MEDIUM] CWE-190 Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT: Missing fix for CVE-2025-66168: MQTT control packet remaining length field is not properly validated
Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT: Missing fix for CVE-2025-66168: MQTT control packet remaining length field is not properly validated
Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT.
The fix for "CVE-2025-66168: MQTT co
cvelistv5
CVE-2026-34197HIGHCVSS 8.8PoCfixed in 5.19.4≥ 6.0.0, < 6.2.32026-04-07
CVE-2026-34197 [HIGH] CWE-20 CVE-2026-34197: Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability i
Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ.
Apache ActiveMQ Classic exposes the Jolokia JMX-HTTP bridge at /api/jolokia/ on the web console. The default Jolokia access policy permits exec operations on all ActiveMQ MBeans (org.apache.activemq:*), includi
cvelistv5nvd
CVE-2026-33227MEDIUMCVSS 4.3fixed in 5.19.3≥ 6.0.0, < 6.2.22026-04-07
CVE-2026-33227 [MEDIUM] CWE-22 CVE-2026-33227: Improper validation and restriction of a classpath path name vulnerability in
Apache ActiveMQ Cli
Improper validation and restriction of a classpath path name vulnerability in
Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ Web, Apache ActiveMQ.
In two instances (when creating a Stomp consumer and also browsing messages in the Web console) an authenticated user provided "key" value could be constructed to t
cvelistv5nvd
CVE-2025-66168HIGHCVSS 8.8≥ 6.0.0, < 6.2.42026-03-04
CVE-2025-66168 [MEDIUM] CWE-190 CVE-2025-66168: Apache ActiveMQ does not properly validate the remaining length field which may lead to an overflow
Apache ActiveMQ does not properly validate the remaining length field which may lead to an overflow during the decoding of malformed packets. When this integer overflow occurs, ActiveMQ may incorrectly compute the total Remaining Length and subsequently misinterpret the payload as multiple MQTT control packets which makes the broker susceptible to un
cvelistv5nvd
CVE-2025-27533MEDIUMCVSS 6.9PoC≥ 6.0.0, < 6.1.6≥ 5.18.0, < 5.18.7+2 more2025-05-07
CVE-2025-27533 [MEDIUM] CWE-789 CVE-2025-27533: Memory Allocation with Excessive Size Value vulnerability in Apache ActiveMQ.
During unmarshalling
Memory Allocation with Excessive Size Value vulnerability in Apache ActiveMQ.
During unmarshalling of OpenWire commands the size value of buffers was not properly validated which could lead to excessive memory allocation and be exploited to cause a denial of service (DoS) by depleting process memory, thereby affecting applications and services that
cvelistv5nvd
CVE-2024-32114HIGHCVSS 8.8≥ 6.0.0, ≤ 6.1.12024-05-02
CVE-2024-32114 [HIGH] CWE-1188 CVE-2024-32114: In Apache ActiveMQ 6.x, the default configuration doesn't secure the API web context (where the Jolo
In Apache ActiveMQ 6.x, the default configuration doesn't secure the API web context (where the Jolokia JMX REST API and the Message REST API are located).
It means that anyone can use these layers without any required authentication. Potentially, anyone can interact with the broker (using Jolokia JMX REST API) and/or produce/consume messages or purg
cvelistv5nvd
CVE-2022-41678HIGHCVSS 8.8PoCfixed in 5.16.6≥ 5.17.0, < 5.17.42023-11-28
CVE-2022-41678 [HIGH] CWE-287 CVE-2022-41678: Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution.
In
Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution.
In details, in ActiveMQ configurations, jetty allows
org.jolokia.http.AgentServlet to handler request to /api/jolokia
org.jolokia.http.HttpRequestHandler#handlePostRequest is able to
create JmxRequest through JSONObject. And calls to
org.jolokia.http.HttpRe
cvelistv5nvd
CVE-2023-46604CRITICALCVSS 9.8KEVPoC≥ 5.18.0, < 5.18.3≥ 5.17.0, < 5.17.6+2 more2023-10-27
CVE-2023-46604 [CRITICAL] CWE-502 CVE-2023-46604: The Java OpenWire protocol marshaller is vulnerable to Remote Code
Execution. This vulnerability ma
The Java OpenWire protocol marshaller is vulnerable to Remote Code
Execution. This vulnerability may allow a remote attacker with network
access to either a Java-based OpenWire broker or client to run arbitrary
shell commands by manipulating serialized class types in the OpenWire
protocol to cause either the client or the broker (respectively) to
cvelistv5nvd
CVE-2021-26117HIGHCVSS 7.5≥ Apache ActiveMQ Artemis, < 2.16.0≥ Apache ActiveMQ, < 5.16.12021-01-27
CVE-2021-26117 [HIGH] CWE-287 CVE-2021-26117: The optional ActiveMQ LDAP login module can be configured to use anonymous access to the LDAP server
The optional ActiveMQ LDAP login module can be configured to use anonymous access to the LDAP server. In this case, for Apache ActiveMQ Artemis prior to version 2.16.0 and Apache ActiveMQ prior to versions 5.16.1 and 5.15.14, the anonymous context is used to verify a valid users password in error, resulting in no check on the password.
cvelistv5nvd
CVE-2018-8006MEDIUMCVSS 6.1PoCv5.0.0 to 5.15.52018-10-10
CVE-2018-8006 [MEDIUM] CWE-79 CVE-2018-8006: An instance of a cross-site scripting vulnerability was identified to be present in the web based ad
An instance of a cross-site scripting vulnerability was identified to be present in the web based administration console on the queue.jsp page of Apache ActiveMQ versions 5.0.0 to 5.15.5. The root cause of this issue is improper data filtering of the QueueFilter parameter.
cvelistv5nvd
CVE-2018-11775HIGHCVSS 7.4v5.0.0 - 5.15.52018-09-10
CVE-2018-11775 [HIGH] CWE-295 CVE-2018-11775: TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which coul
TLS hostname verification when using the Apache ActiveMQ Client before 5.15.6 was missing which could make the client vulnerable to a MITM attack between a Java application using the ActiveMQ client and the ActiveMQ server. This is now enabled by default.
cvelistv5nvd
CVE-2017-15709LOWCVSS 3.7vApache ActiveMQ 5.14.0 to 5.15.22018-02-13
CVE-2017-15709 [LOW] CWE-200 CVE-2017-15709: When using the OpenWire protocol in ActiveMQ versions 5.14.0 to 5.15.2 it was found that certain sys
When using the OpenWire protocol in ActiveMQ versions 5.14.0 to 5.15.2 it was found that certain system details (such as the OS and kernel version) are exposed as plain text.
cvelistv5nvd
CVE-2016-6810MEDIUMCVSS 6.1v5.0.0 to 5.14.12018-01-10
CVE-2016-6810 [MEDIUM] CWE-79 CVE-2016-6810: In Apache ActiveMQ 5.x before 5.14.2, an instance of a cross-site scripting vulnerability was identi
In Apache ActiveMQ 5.x before 5.14.2, an instance of a cross-site scripting vulnerability was identified to be present in the web based administration console. The root cause of this issue is improper user data output validation.
cvelistv5nvd