Home

Description

Active debug code exists in the ARN resolver of amazon-mq rabbitmq-aws before version 0.2.1. A debug ARN scheme (arn:aws-debug:file) accepted by the PUT /api/aws/arn/validate validation endpoint might allow remote authenticated users to perform arbitrary file reads on any file accessible to the RabbitMQ process. To remediate this issue, customers should upgrade to version 0.2.1 of rabbitmq-aws. If RabbitMQ is configured to use TLS for connections, we also recommend rotating any associated private certificate keys.

PUBLISHED Reserved 2026-05-20 | Published 2026-05-20 | Updated 2026-05-20 | Assigner AMZN




HIGH: 7.7CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

HIGH: 8.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N

Problem types

CWE-489 Active debug code

Product status

Default status
unaffected

0.1.0 (custom)
affected

References

github.com/amazon-mq/rabbitmq-aws/releases/tag/0.2.1 patch

aws.amazon.com/security/security-bulletins/2026-034-aws/ vendor-advisory

github.com/...mq-aws/security/advisories/GHSA-8554-wg4r-7hxm third-party-advisory

cve.org (CVE-2026-9133)

nvd.nist.gov (CVE-2026-9133)

Download JSON