đ° Full Story
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a highâseverity Apache ActiveMQ vulnerability, CVE-2026-34197, to its Known Exploited Vulnerabilities (KEV) list on April 16â17, 2026, citing confirmed active exploitation.
The flaw, described as improper input validation in ActiveMQâs Jolokia management API, can enable remote code execution by convincing the broker to fetch remote configuration and run OS commands.
Researcher Naveen Sunkavally of Horizon3 said the bug had been present in the codebase for about 13 years and was discovered with assistance from an AI tool.
CISAâs KEV listing triggered Binding Operational Directive 22-01, giving federal civilian agencies until April 30, 2026 to patch or explain mitigation steps.
Apache has issued fixes; administrators are urged to apply the vendor updates for the 5.19.x and 6.2.x series, audit externally reachable Jolokia endpoints, disable or restrict Jolokia where unnecessary, remove default credentials and monitor for signs of compromise.
Security firms report thousands of exposed ActiveMQ instances and evidence of scans and exploitation attempts in the wild.







đŹ Commentary