Remote File Read Vulnerability in RabbitMQ AWS Plugin by Amazon
CVE-2026-9133

8.3HIGH

Key Information:

Vendor

Aws

Vendor
CVE Published:
20 May 2026

What is CVE-2026-9133?

The Amazon MQ RabbitMQ AWS plugin prior to version 0.2.1 contains a vulnerability due to the presence of active debug code in its ARN resolver. This debug code permits remote authenticated users to exploit the PUT /api/aws/arn/validate endpoint, potentially allowing them to read arbitrary files that the RabbitMQ process can access. To address this vulnerability, users are highly encouraged to upgrade to version 0.2.1 and, if RabbitMQ is configured for TLS, rotate any private certificate keys associated with the connections for enhanced security.

Affected Version(s)

RabbitMQ AWS 0.1.0 <= 0.2.0

References

CVSS V4

Score:
8.3
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.