<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Spring-Xml — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/spring-xml/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 08 Apr 2026 14:30:27 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/spring-xml/feed.xml" rel="self" type="application/rss+xml"/><item><title>Apache ActiveMQ Classic RCE via Jolokia API Exploitation</title><link>https://feed.craftedsignal.io/briefs/2026-04-activemq-rce/</link><pubDate>Wed, 08 Apr 2026 14:30:27 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-activemq-rce/</guid><description>A remote code execution vulnerability (CVE-2026-34197) in Apache ActiveMQ Classic allows authenticated attackers to invoke management operations through the Jolokia API to retrieve a remote configuration file and execute OS commands, potentially exploitable without authentication via CVE-2024-32114.</description><content:encoded><![CDATA[<p>A remote code execution vulnerability, CVE-2026-34197, has been identified in Apache ActiveMQ Classic, an open-source messaging and Integration Patterns server widely used across industries. This vulnerability, present for 13 years, allows attackers to invoke management operations through the Jolokia API and instruct the broker to retrieve a remote configuration file, leading to OS command execution. This is achieved by bypassing CVE-2022-41678, a previous bug that allowed webshell creation. Additionally, CVE-2024-32114 exposes the Jolokia API to unauthenticated users in ActiveMQ versions 6.0.0 through 6.1.1, enabling potential RCE without authentication. The vulnerability affects ActiveMQ Classic deployments and was addressed in versions 5.19.4 and 6.2.3.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies an Apache ActiveMQ Classic instance running a vulnerable version (prior to 5.19.4 or 6.2.3).</li>
<li>If the instance is running ActiveMQ 6.0.0 through 6.1.1, the attacker leverages CVE-2024-32114 to access the Jolokia API without authentication. Otherwise, the attacker authenticates to the ActiveMQ instance.</li>
<li>The attacker invokes management operations through the Jolokia API to target ActiveMQ&rsquo;s VM transport feature.</li>
<li>The attacker crafts a VM transport URI referencing a non-existent broker.</li>
<li>ActiveMQ creates the broker and accepts a parameter instructing it to load a configuration from a URL controlled by the attacker.</li>
<li>The attacker hosts a malicious Spring XML configuration file on a remote server.</li>
<li>The ActiveMQ broker retrieves and processes the malicious Spring XML configuration file.</li>
<li>The Spring XML file instantiates bean definitions that execute arbitrary OS commands, achieving remote code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could lead to complete compromise of the ActiveMQ server, potentially impacting numerous industries relying on this messaging middleware. Attackers could gain unauthorized access to sensitive data, disrupt message queues, and pivot to other systems within the network. The scope of the impact depends on the ActiveMQ deployment and the attacker&rsquo;s objectives. Unauthenticated exploitation via CVE-2024-32114 significantly broadens the attack surface.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade Apache ActiveMQ Classic to versions 5.19.4 or 6.2.3 or later to address CVE-2026-34197.</li>
<li>For ActiveMQ versions 6.0.0 through 6.1.1, verify the configuration and security constraints to ensure the Jolokia API is not exposed without authentication, mitigating CVE-2024-32114.</li>
<li>Deploy the Sigma rule &ldquo;ActiveMQ Jolokia API Access&rdquo; to monitor for unauthorized access attempts to the Jolokia API.</li>
<li>Implement network segmentation to limit the blast radius in case of a successful compromise.</li>
<li>Monitor process creation events for suspicious processes spawned by the ActiveMQ Java process, leveraging the &ldquo;ActiveMQ Suspicious Process Creation&rdquo; Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>activemq</category><category>rce</category><category>jolokia</category><category>cve-2026-34197</category><category>cve-2024-32114</category><category>cve-2022-41678</category><category>spring-xml</category></item></channel></rss>