CVE-2026-4649
Authentication Bypass in Apache Artemis Enables Message Disclosure and Injection
Publication date: 2026-03-24
Last updated on: 2026-03-24
Assigner: KNIME AG
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apache | artemis | to 2.52.0 (exc) |
| knime | business_hub | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-306 | The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects Apache Artemis versions before 2.52.0 and is an authentication bypass flaw. It allows an attacker with at least normal user privileges and the ability to execute workflows in an executor to read all messages exchanged via the broker and inject new messages. The attacker can install and register a federated mirror without authentication to the original Apache Artemis instance, thereby gaining unauthorized access to internal messages.
Since KNIME Business Hub uses Apache Artemis, it is also affected by this issue. The vulnerability requires some level of user access within the system but does not require external exposure of Apache Artemis.
How can this vulnerability impact me? :
The vulnerability can lead to unauthorized reading of all internal messages exchanged via the Apache Artemis broker and injection of new messages. This can compromise the confidentiality and integrity of the message data within the affected system.
An attacker with normal user privileges could exploit this flaw to manipulate message flows, potentially disrupting operations or injecting malicious data.
Since the issue affects all versions of KNIME Business Hub, users of this software are also at risk until they update to a fixed version.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
The recommended immediate step to mitigate this vulnerability is to update Apache Artemis to a fixed version. Fixed versions are included in KNIME Business Hub versions 1.18.0, 1.17.4, and 1.16.3.
No workaround is known, so applying the update as soon as possible is critical to prevent exploitation.