CVE-2025-30219
Description
RabbitMQ is a messaging and streaming broker. Versions prior to 4.0.3 are vulnerable to a sophisticated attack that could modify virtual host name on disk and then make it unrecoverable (with other on disk file modifications) can lead to arbitrary JavaScript code execution in the browsers of management UI users. When a virtual host on a RabbitMQ node fails to start, recent versions will display an error message (a notification) in the management UI. The error message includes virtual host name, which was not escaped prior to open source RabbitMQ 4.0.3 and Tanzu RabbitMQ 4.0.3, 3.13.8. An attack that both makes a virtual host fail to start and creates a new virtual host name with an XSS code snippet or changes the name of an existing virtual host on disk could trigger arbitrary JavaScript code execution in the management UI (the user's browser). Open source RabbitMQ 4.0.3 and Tanzu RabbitMQ 4.0.3 and 3.13.8 patch the issue.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
RabbitMQ prior to 4.0.3 has an XSS vulnerability in management UI error messages due to unescaped virtual host names, allowing arbitrary JavaScript execution.
Vulnerability
Overview
RabbitMQ versions prior to 4.0.3 are vulnerable to a stored cross-site scripting (XSS) flaw in the management UI. When a virtual host fails to start, the error notification includes the virtual host name without proper escaping. An attacker who can modify the virtual host name on disk (e.g., by altering configuration files) and cause the virtual host to fail to start can inject arbitrary JavaScript code into the error message [1].
Exploitation
Prerequisites
Exploitation requires a sophisticated attack chain: the attacker must first gain the ability to modify virtual host names on disk (e.g., through file write access or other means) and then trigger a failure for that virtual host. The injected JavaScript executes in the browsers of management UI users who view the error notification. No authentication is needed to view the management UI if it is exposed, but the attacker needs prior access to modify on-disk data [1].
Impact
Successful exploitation leads to arbitrary JavaScript execution in the context of the management UI. This could allow an attacker to perform actions on behalf of an authenticated administrator, steal session tokens, or deface the interface. The CVSS v3.1 base score is 6.1 (Medium), reflecting the need for prior access to modify files [1].
Mitigation
The vulnerability is patched in open source RabbitMQ 4.0.3 and Tanzu RabbitMQ 4.0.3 and 3.13.8. Users unable to upgrade can disable the management plugin and rely on Prometheus and Grafana for monitoring as a workaround [1].
AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
14rabbitmq_v1_4_0, rabbitmq_v1_5_0, rabbitmq_v1_6_0, …+ 1 more
- (no CPE)range: rabbitmq_v1_4_0, rabbitmq_v1_5_0, rabbitmq_v1_6_0, …
- (no CPE)range: <4.0.3
- Range: <4.0.3, <3.13.8
- osv-coords11 versionspkg:bitnami/rabbitmqpkg:rpm/opensuse/rabbitmq-server313&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/rabbitmq-server&distro=openSUSE%20Leap%2015.6pkg:rpm/opensuse/rabbitmq-server&distro=openSUSE%20Leap%2016.0pkg:rpm/opensuse/rabbitmq-server&distro=openSUSE%20Tumbleweedpkg:rpm/suse/rabbitmq-server313&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6pkg:rpm/suse/rabbitmq-server313&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP7pkg:rpm/suse/rabbitmq-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP6pkg:rpm/suse/rabbitmq-server&distro=SUSE%20Linux%20Enterprise%20Module%20for%20Server%20Applications%2015%20SP7pkg:rpm/suse/rabbitmq-server&distro=SUSE%20Linux%20Enterprise%20Server%2016.0pkg:rpm/suse/rabbitmq-server&distro=SUSE%20Linux%20Enterprise%20Server%20for%20SAP%20applications%2016.0
< 4.0.3+ 10 more
- (no CPE)range: < 4.0.3
- (no CPE)range: < 3.13.1-150600.13.8.1
- (no CPE)range: < 3.8.11-150300.3.19.1
- (no CPE)range: < 4.1.5-160000.1.1
- (no CPE)range: < 3.13.7-4.1
- (no CPE)range: < 3.13.1-150600.13.8.1
- (no CPE)range: < 3.13.1-150600.13.8.1
- (no CPE)range: < 3.8.11-150300.3.19.1
- (no CPE)range: < 3.8.11-150300.3.19.1
- (no CPE)range: < 4.1.5-160000.1.1
- (no CPE)range: < 4.1.5-160000.1.1
Patches
195165215cb01Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.