CVE-2026-24457
OpenMQ Config Parsing Flaw Allows Arbitrary File Read, RCE
Publication date: 2026-03-05
Last updated on: 2026-04-15
Assigner: Eclipse Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| eclipse | openmq | to 6.5.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
| CWE-27 | The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize multiple internal "../" sequences that can resolve to a location that is outside of that directory. |
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :
This vulnerability can have severe impacts including unauthorized disclosure of sensitive files on the server hosting OpenMQ. Attackers can read arbitrary files, potentially exposing confidential data.
In more severe scenarios, attackers may exploit this vulnerability to achieve remote code execution (RCE), which could allow them to take control of the affected server, disrupt services, or further compromise the network.
Given the critical CVSS score of 9.1, the risk posed by this vulnerability is high and could lead to significant security breaches.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
I don't know
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': "CVE-2026-24457 is a critical vulnerability in Eclipse OpenMQ, specifically in versions 6.5.1 and earlier, including OpenMQ implementations within Glassfish and Payara. It arises from unsafe parsing of OpenMQ's configuration files, which allows a remote attacker to read arbitrary files on the MQ Broker's host server."}, {'type': 'paragraph', 'content': 'This means an attacker can access unauthorized files on the host operating system where OpenMQ is running. In some cases, this vulnerability can also lead to remote code execution (RCE), allowing the attacker to run malicious code on the server.'}, {'type': 'paragraph', 'content': 'The vulnerability is related to path traversal and improper validation issues, classified under CWE-22 and CWE-27.'}] [1]