Apache ActiveMQ NMS AMQP Client: Deserialization of Untrusted Data
Description
A Deserialization of Untrusted Data vulnerability exists in the Apache ActiveMQ NMS AMQP Client.
This issue affects all versions of Apache ActiveMQ NMS AMQP up to and including 2.3.0, when establishing connections to untrusted AMQP servers. Malicious servers could exploit unbounded deserialization logic present in the client to craft responses that may lead to arbitrary code execution on the client side.
Although version 2.1.0 introduced a mechanism to restrict deserialization via allow/deny lists, the protection was found to be bypassable under certain conditions.
In line with Microsoft’s deprecation of binary serialization in .NET 9, the project is evaluating the removal of .NET binary serialization support from the NMS API entirely in future releases.
Mitigation and Recommendations: Users are strongly encouraged to upgrade to version 2.4.0 or later, which resolves the issue. Additionally, projects depending on NMS-AMQP should migrate away from .NET binary serialization as part of a long-term hardening strategy.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Apache ActiveMQ NMS AMQP Client ≤2.3.0 deserialization flaw enables RCE when connecting to untrusted servers; upgrade to 2.4.0.
A Deserialization of Untrusted Data vulnerability exists in the Apache ActiveMQ NMS AMQP Client, affecting all versions up to and including 2.3.0 [1][3]. The client performs unbounded deserialization of responses from AMQP servers, which can be exploited by a malicious server to craft responses leading to arbitrary code execution on the client side [1][3].
To exploit this vulnerability, an attacker must control a malicious AMQP server that the client connects to. Although version 2.1.0 introduced allow/deny lists to restrict deserialization, these protections were found to be bypassable under certain conditions [1][3]. No authentication is required from the attacker's perspective; the client initiates the connection.
Successful exploitation allows an attacker to execute arbitrary code on the client machine, potentially compromising the system and data [1]. The impact is considered important due to the possibility of remote code execution.
Mitigation: Users are strongly encouraged to upgrade to version 2.4.0 or later, which resolves the issue [1][3]. Additionally, as Microsoft has deprecated binary serialization in .NET 9, the project recommends migrating away from .NET binary serialization as part of a long-term hardening strategy [1][3].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
Apache.NMS.AMQPNuGet | < 2.4.0 | 2.4.0 |
Affected products
2- Range: <=2.3.0
- Apache Software Foundation/Apache ActiveMQ NMS AMQP Clientv5Range: 0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/advisories/GHSA-4mjw-xr5x-prpcghsaADVISORY
- lists.apache.org/thread/9k684j07ljrshy3hxwhj5m0xjmkz1g2nghsavendor-advisoryWEB
- nvd.nist.gov/vuln/detail/CVE-2025-54539ghsaADVISORY
- www.openwall.com/lists/oss-security/2025/10/15/3ghsaWEB
News mentions
0No linked articles in our index yet.