VYPR

Maven package

org.apache.activemq/apache-activemq

pkg:maven/org.apache.activemq/apache-activemq

Vulnerabilities (9)

  • CVE-2026-41044HigApr 24, 2026
    affected < 5.19.6fixed 5.19.6

    Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ, Apache ActiveMQ Broker, Apache ActiveMQ All. An authenticated attacker can use the admin web console page to construct a malicious broker name that bypasses nam

  • CVE-2026-41043MedApr 24, 2026
    affected < 5.19.6fixed 5.19.6

    Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) vulnerability in Apache ActiveMQ, Apache ActiveMQ Web. An authenticated attacker can show malicious content when browsing queues in the web console by overriding the content type to be HTML (instead of

  • CVE-2026-40466HigApr 24, 2026
    affected < 5.19.6fixed 5.19.6

    Improper Input Validation, Improper Control of Generation of Code ('Code Injection') vulnerability in Apache ActiveMQ Broker, Apache ActiveMQ All, Apache ActiveMQ. An authenticated attacker may bypass the fix in CVE-2026-34197 by adding a connector using an HTTP Discovery tran

  • CVE-2026-39304HigApr 10, 2026
    affected < 5.19.4fixed 5.19.4

    Denial of Service via Out of Memory vulnerability in Apache ActiveMQ Client, Apache ActiveMQ Broker, Apache ActiveMQ. ActiveMQ NIO SSL transports do not correctly handle TLSv1.3 handshake KeyUpdates triggered by clients. This makes it possible for a client to rapidly trigger upd

  • CVE-2026-40046HigApr 9, 2026
    affected >= 6.0.0, < 6.2.4fixed 6.2.4

    Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT. The fix for "CVE-2025-66168: MQTT control packet remaining length field is not properly validated" was only applied to 5.19.2 (and future 5.19.x) releases but was missed f

  • CVE-2025-66168MedMar 4, 2026
    affected < 5.19.2fixed 5.19.2

    WARNING: Users of 6.x should upgrade to 6.2.4 or later as the fix was missed in previous 6.x releases. See the  following for more details: https://activemq.apache.org/security-advisories.data/CVE-2026-40046-announcement.txt https://www.cve.org/CVERecord?id=CVE-2026-40046

  • CVE-2024-32114May 2, 2024
    affected >= 6.0.0, < 6.1.2fixed 6.1.2

    In Apache ActiveMQ 6.x, the default configuration doesn't secure the API web context (where the Jolokia JMX REST API and the Message REST API are located). It means that anyone can use these layers without any required authentication. Potentially, anyone can interact with the bro

  • CVE-2022-41678Nov 28, 2023
    affected < 5.16.6fixed 5.16.6

    Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution.  In details, in ActiveMQ configurations, jetty allows org.jolokia.http.AgentServlet to handler request to /api/jolokia org.jolokia.http.HttpRequestHandler#handlePostRequest is able to

  • CVE-2012-6551Apr 21, 2013
    affected < 5.8.0fixed 5.8.0

    The default configuration of Apache ActiveMQ before 5.8.0 enables a sample web application, which allows remote attackers to cause a denial of service (broker resource consumption) via HTTP requests.