Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-32642

CVE-2026-32642: Apache Artemis Auth Bypass Vulnerability

CVE-2026-32642 is an incorrect authorization vulnerability in Apache Artemis and Apache ActiveMQ Artemis affecting OpenWire protocol connections. This article covers the technical details, affected versions, and mitigation.

Published: March 27, 2026

CVE-2026-32642 Overview

CVE-2026-32642 is an Incorrect Authorization vulnerability (CWE-863) affecting Apache Artemis and Apache ActiveMQ Artemis. The vulnerability exists when an application using the OpenWire protocol attempts to create a non-durable JMS topic subscription on an address that doesn't exist. The issue occurs with an authenticated user who has the createDurableQueue permission but lacks the createAddress permission when address auto-creation is disabled.

In this circumstance, a temporary address will be created when the attempt should instead fail since the user is not authorized to create the corresponding address. When the OpenWire connection is closed, the address is removed.

Critical Impact

Authenticated users with limited permissions can bypass authorization controls to create temporary addresses on Apache Artemis message brokers, potentially allowing unauthorized queue/topic manipulation.

Affected Products

  • Apache Artemis versions 2.50.0 through 2.52.0
  • Apache ActiveMQ Artemis versions 2.0.0 through 2.44.0

Discovery Timeline

  • 2026-03-24 - CVE CVE-2026-32642 published to NVD
  • 2026-03-24 - Last updated in NVD database

Technical Details for CVE-2026-32642

Vulnerability Analysis

This authorization bypass vulnerability stems from improper permission validation in the OpenWire protocol handler within Apache Artemis. When a user with the createDurableQueue permission attempts to create a non-durable JMS topic subscription on a non-existent address, the system fails to properly validate that the user also possesses the createAddress permission.

The vulnerability specifically manifests when address auto-creation is disabled in the broker configuration. Under these conditions, the system should deny the request entirely since the user lacks authority to create the underlying address. However, the flawed authorization logic allows a temporary address to be created, effectively bypassing the intended security controls.

The temporary nature of the created address—it is removed when the OpenWire connection closes—limits the persistence of the bypass but still represents a clear violation of the configured authorization model.

Root Cause

The root cause is an Incorrect Authorization check (CWE-863) in the OpenWire protocol handling code. The authorization logic incorrectly allows address creation when processing non-durable topic subscription requests, even when the authenticated user only has createDurableQueue permission without the corresponding createAddress permission. This represents a gap in the permission validation flow that should enforce both permissions for the operation to succeed.

Attack Vector

The attack requires network access to an Apache Artemis or Apache ActiveMQ Artemis broker with the following conditions:

  1. The attacker must be an authenticated user with createDurableQueue permission
  2. The attacker must NOT have createAddress permission
  3. Address auto-creation must be disabled on the broker
  4. The attacker connects using the OpenWire protocol
  5. The attacker attempts to create a non-durable JMS topic subscription on a non-existent address

Upon successful exploitation, a temporary address is created despite the user lacking proper authorization. The address persists until the OpenWire connection is closed. This could allow attackers to temporarily manipulate messaging infrastructure in ways the security policy was designed to prevent.

Detection Methods for CVE-2026-32642

Indicators of Compromise

  • Unexpected temporary addresses appearing in Apache Artemis broker logs
  • Address creation events from users who should only have createDurableQueue permissions
  • OpenWire protocol connections followed by address creation without proper authorization
  • Audit log entries showing address creation and immediate deletion patterns

Detection Strategies

  • Enable detailed authorization logging in Apache Artemis to capture permission check events
  • Monitor for address creation events from users with limited permission sets
  • Implement alerting for OpenWire protocol activity associated with address manipulation
  • Review broker audit logs for patterns of temporary address creation and deletion

Monitoring Recommendations

  • Configure Apache Artemis security audit logging to capture all authorization decisions
  • Set up monitoring for unusual patterns in address lifecycle events
  • Implement network monitoring for OpenWire protocol traffic to affected brokers
  • Establish baseline metrics for address creation activity to identify anomalies

How to Mitigate CVE-2026-32642

Immediate Actions Required

  • Upgrade Apache Artemis to version 2.53.0 or later immediately
  • For Apache ActiveMQ Artemis, apply the latest security patches from Apache
  • Review current user permissions and remove unnecessary createDurableQueue permissions where possible
  • Enable enhanced audit logging to detect potential exploitation attempts

Patch Information

Users are recommended to upgrade to Apache Artemis version 2.53.0, which fixes this authorization bypass issue. The patch addresses the permission validation logic in the OpenWire protocol handler to properly enforce the createAddress permission requirement.

For detailed patch information, refer to the Apache Security Discussion and the OpenWall OSS-Security Update.

Workarounds

  • Restrict createDurableQueue permissions to only trusted users who also have createAddress permissions
  • Enable address auto-creation as a temporary measure (note: this changes the security model)
  • Implement network segmentation to limit access to the OpenWire protocol endpoint
  • Consider disabling OpenWire protocol if not required and use alternative protocols
bash
# Configuration example - Restrict user permissions in broker.xml
# Ensure users with createDurableQueue also have createAddress or remove the permission
# Example security-settings in broker.xml:
# <security-setting match="#">
#    <permission type="createDurableQueue" roles="admin"/>
#    <permission type="createAddress" roles="admin"/>
# </security-setting>

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechApache Artemis

  • SeverityLOW

  • CVSS Score2.3

  • EPSS Probability0.04%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-863
  • Technical References
  • Apache Security Discussion

  • OpenWall OSS-Security Update
  • Related CVEs
  • CVE-2026-4649: KNIME Business Hub Auth Bypass Vulnerability

  • CVE-2026-27446: Apache Artemis Auth Bypass Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English