Apache ActiveMQ Multiple Vulnerabilities - CVSS 8.8 Remote Attack
Summary
CERT-Bund issued security advisory WID-SEC-2026-0991 regarding multiple vulnerabilities in Apache ActiveMQ (CVSS Base Score 8.8). Affected products include Client, Broker, and Web components prior to versions 5.19.3 and 6.2.2 (also 5.19.4 and 6.2.3). Remote authenticated attackers can exploit these vulnerabilities to manipulate files or execute arbitrary code on vulnerable systems.
What changed
CERT-Bund published a security advisory documenting multiple vulnerabilities in Apache ActiveMQ, an open-source message broker used for transport of messages between programs. The vulnerabilities affect Client, Broker, and Web components across versions prior to 5.19.3 and 6.2.2, with CVSS Base Score of 8.8 indicating high severity. Remote authenticated attackers can exploit these flaws to manipulate files or execute arbitrary code on affected systems.
Organizations running any affected versions of Apache ActiveMQ should implement mitigation measures immediately. Technology companies using this message broker software should upgrade to patched versions (5.19.3/6.2.2 or later) to address the security risks. IT security teams should assess exposure and apply available mitigations or patches.
Archived snapshot
Apr 16, 2026GovPing captured this document from the original source. If the source has since changed or been removed, this is the text as it existed at that time.
[WID-SEC-2026-0991] Apache ActiveMQ, Client, Broker und Web: Mehrere Schwachstellen CVSS Base Score 8.8 (hoch) CVSS Temporal Score 7.9 (hoch) Remoteangriff ja Datum 07.04.2026 Stand UPDATE 16.04.2026 Mitigation ja
Betroffene Systeme
Betriebssystem
- Sonstiges
- UNIX
- Windows
Produktbeschreibung
Apache ActiveMQ ist ein Open Source Message Broker, der den Transport von Nachrichten zwischen verschiedenen Programmen bewerkstelligt.
Produkte
07.04.2026
- Apache ActiveMQ Client <5.19.3
Apache ActiveMQ Client <6.2.2
Apache ActiveMQ Broker <5.19.3
Apache ActiveMQ Broker <6.2.2
Apache ActiveMQ Web <5.19.3
Apache ActiveMQ Web <6.2.2
Apache ActiveMQ <5.19.3
Apache ActiveMQ <6.2.2
Apache ActiveMQ Broker <5.19.4
Apache ActiveMQ Broker <6.2.3
Apache ActiveMQ <5.19.4
Apache ActiveMQ <6.2.3
Angriff
Angriff
Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Apache ActiveMQ ausnutzen, um Dateien zu manipulieren oder beliebigen Code auszuführen. CVE Informationen Versionshistorie Feedback zum Advisory geben
Related changes
Get daily alerts for CERT-Bund Security Advisories
Daily digest delivered to your inbox.
Free. Unsubscribe anytime.
Source
About this page
Every important government, regulator, and court update from around the world. One place. Real-time. Free. Our mission
Source document text, dates, docket IDs, and authority are extracted directly from CERT-Bund.
The summary, classification, recommended actions, deadlines, and penalty information are AI-generated from the original text and may contain errors. Always verify against the source document.
Classification
Who this affects
Taxonomy
Browse Categories
Get alerts for this source
We'll email you when CERT-Bund Security Advisories publishes new changes.
Subscribed!
Optional. Filters your digest to exactly the updates that matter to you.