remote code execute via rabbitmq messages. Users can use the code under the master branch in project repo to fix this issue, we will release the new version as soon as possible.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-2049 | CWE-502 Deserialization of Untrusted Data at the rabbitmq-connector plugin module in Apache EventMesh (incubating) V1.7.0\V1.8.0 on windows\linux\mac os e.g. platforms allows attackers to send controlled message and remote code execute via rabbitmq messages. Users can use the code under the master branch in project repo to fix this issue, we will release the new version as soon as possible. |
Github GHSA |
GHSA-fj8f-56wc-q36r | rabbitmq-connector plugin module in Apache EventMesh platforms allows attackers to send controlled message |
Wed, 25 Jun 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache eventmesh-connector-rabbitmq
|
|
| CPEs | cpe:2.3:a:apache:eventmesh-connector-rabbitmq:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Apache eventmesh-connector-rabbitmq
|
Wed, 02 Oct 2024 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-10-02T18:06:06.619Z
Reserved: 2023-02-24T08:43:05.213Z
Link: CVE-2023-26512
Updated: 2024-08-02T11:53:53.630Z
Status : Analyzed
Published: 2023-07-17T08:15:09.243
Modified: 2025-06-25T13:04:17.487
Link: CVE-2023-26512
No data.
OpenCVE Enrichment
No data.
EUVD
Github GHSA