Apache Software Foundation: Claude Identifies Critical 13-Year-Old RCE Vulnerability in Apache ActiveMQ

Apache Software Foundation: Claude Identifies Critical 13-Year-Old RCE Vulnerability in Apache ActiveMQ

13-Year-Old Apache ActiveMQ RCE Flaw Discovered by AI Assistant

A critical remote code execution (RCE) vulnerability in Apache ActiveMQ Classic, tracked as CVE-2026-34197, has been uncovered after remaining undetected for 13 years. The flaw allows attackers to execute arbitrary commands by forcing the message broker to download and run a malicious remote configuration file.

The exploit targets Jolokia, a REST API interface in ActiveMQ’s web-based management console. While developers restricted Jolokia to read-only operations in 2023, they retained full permissions for ActiveMQ’s management beans (MBeans), creating a security gap. Attackers can abuse the addNetworkConnector operation by supplying a crafted vm:// URI, which fetches a remote Spring XML file and executes it, granting full system control.

Under normal conditions, exploitation requires administrator credentials (e.g., default admin:admin). However, in ActiveMQ versions 6.0.0 through 6.1.1, a separate flaw (CVE-2024-32114) removes authentication requirements, enabling unauthenticated RCE.

Security researcher Naveen Sunkavally discovered the vulnerability using Claude AI, which analyzed the codebase in 10 minutes a task that typically takes human researchers weeks. The AI identified the interaction between Jolokia, JMX, and network connectors, demonstrating the growing role of AI in vulnerability hunting.

ActiveMQ has been a frequent target for ransomware groups and nation-state actors, making this a high-priority patch. Organizations are advised to upgrade to versions 5.19.4 or 6.2.3, which remove the dangerous vm:// transport capability from remote operations. Additional mitigations include changing default credentials, monitoring logs for suspicious vm:// URIs, and watching for unexpected POST requests to /api/jolokia/ containing addNetworkConnector.

Source: https://gbhackers.com/claude-identifies-critical-13-year-old-rce-vulnerability-in-apache-activemq/

The Apache Software Foundation cybersecurity rating report: https://www.rankiteo.com/company/the-apache-software-foundation

"id": "THE1775629469",
"linkid": "the-apache-software-foundation",
"type": "Vulnerability",
"date": "1/2026",
"severity": "100",
"impact": "5",
"explanation": "Attack threatening the organization's existence"
{'affected_entities': [{'industry': 'Technology/Software Development',
                        'name': 'Apache ActiveMQ',
                        'type': 'Software'}],
 'attack_vector': 'Exploitation of Jolokia REST API via crafted `vm://` URI',
 'description': 'A critical remote code execution (RCE) vulnerability in '
                'Apache ActiveMQ Classic, tracked as CVE-2026-34197, has been '
                'uncovered after remaining undetected for 13 years. The flaw '
                'allows attackers to execute arbitrary commands by forcing the '
                'message broker to download and run a malicious remote '
                'configuration file. The exploit targets Jolokia, a REST API '
                'interface in ActiveMQ’s web-based management console. '
                'Attackers can abuse the `addNetworkConnector` operation by '
                'supplying a crafted `vm://` URI, which fetches a remote '
                'Spring XML file and executes it, granting full system '
                'control. In ActiveMQ versions 6.0.0 through 6.1.1, a separate '
                'flaw (CVE-2024-32114) removes authentication requirements, '
                'enabling unauthenticated RCE.',
 'impact': {'operational_impact': 'Full system control by attackers',
            'systems_affected': 'Apache ActiveMQ Classic (versions 5.x and '
                                '6.x)'},
 'lessons_learned': 'AI-assisted vulnerability hunting can significantly '
                    'accelerate discovery of critical flaws. Default '
                    'credentials and over-permissive configurations remain a '
                    'major security risk.',
 'post_incident_analysis': {'corrective_actions': 'Remove `vm://` transport '
                                                  'capability from remote '
                                                  'operations, enforce '
                                                  'authentication for Jolokia '
                                                  'API, and patch vulnerable '
                                                  'versions.',
                            'root_causes': 'Retention of full permissions for '
                                           'ActiveMQ’s MBeans despite Jolokia '
                                           'read-only restrictions, use of '
                                           '`vm://` URI for remote '
                                           'configuration execution, and '
                                           'unauthenticated access in '
                                           'vulnerable versions '
                                           '(CVE-2024-32114).'},
 'recommendations': 'Upgrade to patched versions (5.19.4 or 6.2.3), change '
                    'default credentials, monitor for suspicious activity, and '
                    'restrict Jolokia API permissions.',
 'references': [{'source': 'Security Research by Naveen Sunkavally'}],
 'response': {'containment_measures': 'Upgrade to versions 5.19.4 or 6.2.3, '
                                      'remove `vm://` transport capability '
                                      'from remote operations',
              'enhanced_monitoring': 'Monitor logs for suspicious `vm://` URIs '
                                     'and unexpected POST requests',
              'remediation_measures': 'Change default credentials, monitor '
                                      'logs for suspicious `vm://` URIs, watch '
                                      'for unexpected POST requests to '
                                      '`/api/jolokia/` containing '
                                      '`addNetworkConnector`'},
 'title': '13-Year-Old Apache ActiveMQ RCE Flaw Discovered by AI Assistant',
 'type': 'Remote Code Execution (RCE)',
 'vulnerability_exploited': ['CVE-2026-34197', 'CVE-2024-32114']}
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.