To remediate this issue, customers should upgrade to version 0.2.1 of rabbitmq-aws. If RabbitMQ is configured to use TLS for connections, we also recommend rotating any associated private certificate keys.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 21 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 20 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Active debug code exists in the ARN resolver of amazon-mq rabbitmq-aws before version 0.2.1. A debug ARN scheme (arn:aws-debug:file) accepted by the PUT /api/aws/arn/validate validation endpoint might allow remote authenticated users to perform arbitrary file reads on any file accessible to the RabbitMQ process. To remediate this issue, customers should upgrade to version 0.2.1 of rabbitmq-aws. If RabbitMQ is configured to use TLS for connections, we also recommend rotating any associated private certificate keys. | |
| Title | Arbitrary file read in rabbitmq-aws plugin | |
| First Time appeared |
Aws
Aws rabbitmq Aws |
|
| Weaknesses | CWE-489 | |
| CPEs | cpe:2.3:a:aws:rabbitmq_aws:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Aws
Aws rabbitmq Aws |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-05-21T12:50:24.829Z
Reserved: 2026-05-20T18:21:53.557Z
Link: CVE-2026-9133
Updated: 2026-05-21T12:49:10.454Z
Status : Deferred
Published: 2026-05-20T20:16:45.860
Modified: 2026-05-21T15:24:25.330
Link: CVE-2026-9133
No data.
OpenCVE Enrichment
Updated: 2026-05-21T08:18:50Z