Active debug code exists in the ARN resolver of amazon-mq rabbitmq-aws before version 0.2.1. A debug ARN scheme (arn:aws-debug:file) accepted by the PUT /api/aws/arn/validate validation endpoint might allow remote authenticated users to perform arbitrary file reads on any file accessible to the RabbitMQ process.
To remediate this issue, customers should upgrade to version 0.2.1 of rabbitmq-aws. If RabbitMQ is configured to use TLS for connections, we also recommend rotating any associated private certificate keys.
Metrics
Affected Vendors & Products
References
History
Thu, 21 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Active debug code exists in the ARN resolver of amazon-mq rabbitmq-aws before version 0.2.1. A debug ARN scheme (arn:aws-debug:file) accepted by the PUT /api/aws/arn/validate validation endpoint might allow remote authenticated users to perform arbitrary file reads on any file accessible to the RabbitMQ process. To remediate this issue, customers should upgrade to version 0.2.1 of rabbitmq-aws. If RabbitMQ is configured to use TLS for connections, we also recommend rotating any associated private certificate keys. | |
| Title | Arbitrary file read in rabbitmq-aws plugin | |
| First Time appeared |
Aws
Aws rabbitmq Aws |
|
| Weaknesses | CWE-489 | |
| CPEs | cpe:2.3:a:aws:rabbitmq_aws:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Aws
Aws rabbitmq Aws |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMZN
Published: 2026-05-20T19:38:11.897Z
Updated: 2026-05-21T12:50:24.829Z
Reserved: 2026-05-20T18:21:53.557Z
Link: CVE-2026-9133
Updated: 2026-05-21T12:49:10.454Z
Status : Deferred
Published: 2026-05-20T20:16:45.860
Modified: 2026-05-21T15:24:25.330
Link: CVE-2026-9133
No data.
ReportizFlow