CVE-2026-9133 PUBLISHED

Arbitrary file read in rabbitmq-aws plugin

Assigner: AMZN
Reserved: 20.05.2026 Published: 20.05.2026 Updated: 21.05.2026

Active debug code exists in the ARN resolver of amazon-mq rabbitmq-aws before version 0.2.1. A debug ARN scheme (arn:aws-debug:file) accepted by the PUT /api/aws/arn/validate validation endpoint might allow remote authenticated users to perform arbitrary file reads on any file accessible to the RabbitMQ process.

To remediate this issue, customers should upgrade to version 0.2.1 of rabbitmq-aws. If RabbitMQ is configured to use TLS for connections, we also recommend rotating any associated private certificate keys.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:H/SI:N/SA:N
CVSS Score: 8.3

Product Status

Vendor AWS
Product RabbitMQ AWS
Versions Default: unaffected
  • affected from 0.1.0 to 0.2.0 (incl.)

References

Problem Types

  • CWE-489 Active debug code CWE

Impacts

  • CAPEC-121 Exploit Non-Production Interfaces