🔐 CVE Alert

CVE-2026-22886

CRITICAL 9.8
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires authentication. However, the product ships with a default administrative account (admin/ admin) and does not enforce a mandatory password change on first use. After the first successful login, the server continues to accept the default password indefinitely without warning or enforcement. In real-world deployments, this service is often left enabled without changing the default credentials. As a result, a remote attacker with access to the service port could authenticate as an administrator and gain full control of the protocol’s administrative features.

CWE CWE-1392 CWE-1393 CWE-1391
Vendor eclipse foundation
Product eclipse openmq
Published Mar 3, 2026
Last Updated Mar 3, 2026
Stay Ahead of the Next One

Get instant alerts for eclipse foundation eclipse openmq

Be the first to know when new critical vulnerabilities affecting eclipse foundation eclipse openmq are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

Eclipse Foundation / Eclipse OpenMQ
0

References

NVD ↗ CVE.org ↗ EPSS Data ↗
gitlab.eclipse.org: https://gitlab.eclipse.org/security/cve-assignment/-/issues/85

Credits

Camilo G. AkA Dedalo (DeepSecurity Perú)