An unsafe parsing of OpenMQ's configuration, allows a remote attacker to read arbitrary files from a MQ Broker's server. A full exploitation could read unauthorized files of the OpenMQ’s host OS. In some scenarios RCE could be achieved.
References
| Link | Resource |
|---|---|
| https://gitlab.eclipse.org/security/cve-assignment/-/issues/84 | Vendor Advisory |
Configurations
History
10 Mar 2026, 19:52
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:eclipse:open_message_queue:*:*:*:*:*:*:*:* | |
| References | () https://gitlab.eclipse.org/security/cve-assignment/-/issues/84 - Vendor Advisory | |
| First Time |
Eclipse open Message Queue
Eclipse |
05 Mar 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-05 19:16
Updated : 2026-03-10 19:52
NVD link : CVE-2026-24457
Mitre link : CVE-2026-24457
CVE.ORG link : CVE-2026-24457
JSON object : View
Products Affected
eclipse
- open_message_queue
