๐Ÿ” CVE Alert

CVE-2026-9133

HIGH 7.7

Arbitrary file read in rabbitmq-aws plugin

CVSS Score
7.7
EPSS Score
0.0%
EPSS Percentile
0th

Active debug code exists in the ARN resolver of amazon-mq rabbitmq-aws before version 0.2.1. A debug ARN scheme (arn:aws-debug:file) accepted by the PUT /api/aws/arn/validate validation endpoint might allow remote authenticated users to perform arbitrary file reads on any file accessible to the RabbitMQ process. To remediate this issue, customers should upgrade to version 0.2.1 of rabbitmq-aws. If RabbitMQ is configured to use TLS for connections, we also recommend rotating any associated private certificate keys.

CWE CWE-489
Vendor aws
Product rabbitmq aws
Published May 20, 2026
Last Updated May 20, 2026
Stay Ahead of the Next One

Get instant alerts for aws rabbitmq aws

Be the first to know when new high vulnerabilities affecting aws rabbitmq aws are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
None
Availability
None

Affected Versions

AWS / RabbitMQ AWS
0.1.0 โ‰ค 0.2.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/amazon-mq/rabbitmq-aws/releases/tag/0.2.1 aws.amazon.com: https://aws.amazon.com/security/security-bulletins/2026-034-aws/ github.com: https://github.com/amazon-mq/rabbitmq-aws/security/advisories/GHSA-8554-wg4r-7hxm