Active debug code exists in the ARN resolver of amazon-mq rabbitmq-aws before version 0.2.1. A debug ARN scheme (arn:aws-debug:file) accepted by the PUT /api/aws/arn/validate validation endpoint might allow remote authenticated users to perform arbitrary file reads on any file accessible to the RabbitMQ process. To remediate this issue, customers should upgrade to version 0.2.1 of rabbitmq-aws. If RabbitMQ is configured to use TLS for connections, we also recommend rotating any associated private certificate keys.
History

Thu, 21 May 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 May 2026 20:15:00 +0000

Type Values Removed Values Added
Description Active debug code exists in the ARN resolver of amazon-mq rabbitmq-aws before version 0.2.1. A debug ARN scheme (arn:aws-debug:file) accepted by the PUT /api/aws/arn/validate validation endpoint might allow remote authenticated users to perform arbitrary file reads on any file accessible to the RabbitMQ process. To remediate this issue, customers should upgrade to version 0.2.1 of rabbitmq-aws. If RabbitMQ is configured to use TLS for connections, we also recommend rotating any associated private certificate keys.
Title Arbitrary file read in rabbitmq-aws plugin
First Time appeared Aws
Aws rabbitmq Aws
Weaknesses CWE-489
CPEs cpe:2.3:a:aws:rabbitmq_aws:*:*:*:*:*:*:*:*
Vendors & Products Aws
Aws rabbitmq Aws
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N'}

cvssV4_0

{'score': 8.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published: 2026-05-20T19:38:11.897Z

Updated: 2026-05-21T12:50:24.829Z

Reserved: 2026-05-20T18:21:53.557Z

Link: CVE-2026-9133

cve-icon Vulnrichment

Updated: 2026-05-21T12:49:10.454Z

cve-icon NVD

Status : Deferred

Published: 2026-05-20T20:16:45.860

Modified: 2026-05-21T15:24:25.330

Link: CVE-2026-9133

cve-icon Redhat

No data.