Description
Once an user is authenticated on Jolokia, he can potentially trigger arbitrary code execution. 

In details, in ActiveMQ configurations, jetty allows
org.jolokia.http.AgentServlet to handler request to /api/jolokia

org.jolokia.http.HttpRequestHandler#handlePostRequest is able to
create JmxRequest through JSONObject. And calls to
org.jolokia.http.HttpRequestHandler#executeRequest.

Into deeper calling stacks,
org.jolokia.handler.ExecHandler#doHandleRequest can be invoked
through refection. This could lead to RCE through via
various mbeans. One example is unrestricted deserialization in jdk.management.jfr.FlightRecorderMXBeanImpl which exists on Java version above 11.

1 Call newRecording.

2 Call setConfiguration. And a webshell data hides in it.

3 Call startRecording.

4 Call copyTo method. The webshell will be written to a .jsp file.

The mitigation is to restrict (by default) the actions authorized on Jolokia, or disable Jolokia.
A more restrictive Jolokia configuration has been defined in default ActiveMQ distribution. We encourage users to upgrade to ActiveMQ distributions version including updated Jolokia configuration: 5.16.6, 5.17.4, 5.18.0, 6.0.0.
Published: 2023-11-28
Score: 8.8 High
EPSS: 93.1% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-3936-1 activemq security update
Github GHSA Github GHSA GHSA-53v4-42fg-g287 Apache ActiveMQ Deserialization of Untrusted Data vulnerability
Ubuntu USN Ubuntu USN USN-6910-1 Apache ActiveMQ vulnerabilities
Ubuntu USN Ubuntu USN USN-7268-1 Apache ActiveMQ vulnerabilities
History

Mon, 03 Nov 2025 22:30:00 +0000

Type Values Removed Values Added
References

Wed, 16 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.69079}

epss

{'score': 0.69512}


Subscriptions

Apache Activemq
Redhat Amq Broker Jboss Fuse Rhosemc
cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-11-03T21:46:33.574Z

Reserved: 2022-09-28T07:40:05.138Z

Link: CVE-2022-41678

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-11-28T16:15:06.840

Modified: 2025-11-03T22:16:00.520

Link: CVE-2022-41678

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-11-28T00:00:00Z

Links: CVE-2022-41678 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses