Security researchers have disclosed a critical remote code execution (RCE) vulnerability, CVE-2026-34197, in Apache ActiveMQ Classic, a popular open-source message broker. The vulnerability, which has been latent in the codebase for 13 years, is being actively exploited in the wild. The flaw resides in the Jolokia JMX-HTTP bridge and allows an authenticated attacker to achieve RCE. However, the threat is magnified because it can be chained with CVE-2024-32114, a flaw that makes the vulnerable endpoint completely unauthenticated. This combination allows attackers to achieve unauthenticated RCE, leading to a full system compromise. The Apache Software Foundation has released patches, and immediate action is required.
CVE-2026-34197: This is an improper input validation vulnerability. An authenticated attacker can send a specially crafted request to the addNetworkConnector() operation via the Jolokia API endpoint (/api/jolokia/). By providing a malicious discovery URI, the attacker can trick the ActiveMQ broker into loading a remote Spring XML application context. This allows them to execute arbitrary Java code within the context of the ActiveMQ process.
CVE-2024-32114: This vulnerability, affecting ActiveMQ versions 6.0.0 through 6.1.1, improperly removes security constraints from the /api/* path. The practical effect is that the entire Jolokia API, including the vulnerable addNetworkConnector() method, becomes accessible without any authentication.
The chaining of these two vulnerabilities is what makes this threat so severe. An attacker needs no prior access or credentials to achieve full remote code execution on a vulnerable, internet-facing ActiveMQ server.
Multiple security firms, including Horizon3.ai and SentinelOne, have confirmed that CVE-2026-34197 is being actively exploited in the wild. Proof-of-concept (PoC) exploit code is publicly available, lowering the bar for attackers to weaponize this vulnerability.
Successful exploitation of this vulnerability chain results in a complete compromise of the ActiveMQ server. An attacker can:
Given that ActiveMQ is often used as a central messaging backbone for enterprise applications, a compromise could have devastating and widespread consequences.
Security teams should hunt for evidence of exploitation in their logs:
| Type | Value | Description | Context | Confidence |
|---|---|---|---|---|
url_pattern |
/api/jolokia/ |
Any access to this URL path should be scrutinized. On patched or properly configured systems, it should not be exposed. | Web server access logs, WAF logs, Reverse proxy logs | high |
string_pattern |
addNetworkConnector |
The presence of this string in POST data to the Jolokia endpoint is a strong indicator of an exploitation attempt. | WAF logs, Application-level logging | high |
string_pattern |
discoveryURI |
The discoveryURI parameter being used with protocols like http:// or ldap:// in a Jolokia request is highly suspicious. |
WAF logs, Application-level logging | high |
process_name |
Unusual child processes of the ActiveMQ Java process |
Monitor for the ActiveMQ JVM spawning shells (sh, bash, cmd.exe) or network tools (curl, wget). |
EDR logs, Host-based monitoring (Sysmon Event ID 1) | high |
/api/jolokia/ endpoint, especially if it contains the strings addNetworkConnector or discoveryURI.jolokia-agent is not enabled in the configuration if it is not explicitly needed.The primary mitigation is to apply the security patches provided by Apache immediately.
Mapped D3FEND Techniques:
As a temporary measure, restrict network access to the ActiveMQ web console and API endpoints, ensuring they are not exposed to the internet.
If the Jolokia agent is not needed for monitoring, disable it in the ActiveMQ configuration to remove the attack surface.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats