Active debug code exists in the ARN resolver of amazon-mq rabbitmq-aws before version 0.2.1. A debug ARN scheme (arn:aws-debug:file) accepted by the PUT /api/aws/arn/validate validation endpoint might allow remote authenticated users to perform arbitrary file reads on any file accessible to the RabbitMQ process.
To remediate this issue, customers should upgrade to version 0.2.1 of rabbitmq-aws. If RabbitMQ is configured to use TLS for connections, we also recommend rotating any associated private certificate keys.
To remediate this issue, customers should upgrade to version 0.2.1 of rabbitmq-aws. If RabbitMQ is configured to use TLS for connections, we also recommend rotating any associated private certificate keys.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 20 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Active debug code exists in the ARN resolver of amazon-mq rabbitmq-aws before version 0.2.1. A debug ARN scheme (arn:aws-debug:file) accepted by the PUT /api/aws/arn/validate validation endpoint might allow remote authenticated users to perform arbitrary file reads on any file accessible to the RabbitMQ process. To remediate this issue, customers should upgrade to version 0.2.1 of rabbitmq-aws. If RabbitMQ is configured to use TLS for connections, we also recommend rotating any associated private certificate keys. | |
| Title | Arbitrary file read in rabbitmq-aws plugin | |
| First Time appeared |
Aws
Aws rabbitmq Aws |
|
| Weaknesses | CWE-489 | |
| CPEs | cpe:2.3:a:aws:rabbitmq_aws:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Aws
Aws rabbitmq Aws |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-05-20T19:40:41.991Z
Reserved: 2026-05-20T18:21:53.557Z
Link: CVE-2026-9133
No data.
Status : Received
Published: 2026-05-20T20:16:45.860
Modified: 2026-05-20T20:16:45.860
Link: CVE-2026-9133
No data.
OpenCVE Enrichment
No data.
Weaknesses