{
	"document":{
		"aggregate_severity":{
			"namespace":"https://nvd.nist.gov/vuln-metrics/cvss",
			"text":"HIGH"
		},
		"category":"csaf_vex",
		"csaf_version":"2.0",
		"distribution":{
			"tlp":{
				"label":"WHITE",
				"url":"https:/www.first.org/tlp/"
			}
		},
		"lang":"en",
		"notes":[
			{
				"text":"['Severity: low \\n\\nAffected versions:\\n\\n- Apache ActiveMQ Client (org.apache.activemq:activemq-client) before 5.19.3\\n- Apache ActiveMQ Client (org.apache.activemq:activemq-client) 6.0.0 before 6.2.2\\n- Apache ActiveMQ Broker (org.apache.activemq:activemq-broker) before 5.19.3\\n- Apache ActiveMQ Broker (org.apache.activemq:activemq-broker) 6.0.0 before 6.2.2\\n- Apache ActiveMQ (org.apache.activemq:activemq-all) before 5.19.3\\n- Apache ActiveMQ (org.apache.activemq:activemq-all) 6.0.0 before 6.2.2\\n- Apache ActiveMQ Web (org.apache.activemq:activemq-web) before 5.19.3\\n- Apache ActiveMQ Web (org.apache.activemq:activemq-web) 6.0.0 before 6.2.2\\n\\nDescription:\\n\\nImproper validation and restriction of a classpath path name vulnerability in Apache ActiveMQ Client, Apache ActiveMQ \\nBroker, Apache ActiveMQ All.\\n\\nIn two instances (when creating a Stomp consumer and also browsing messages in the Web console) an authenticated user \\nprovided \"key\" value could be constructed to traverse the classpath due to path concatenation. As a result, the \\napplication is exposed to a classpath path resource loading vulnerability that could potentially be chained together \\nwith another attack to lead to exploit.This issue affects Apache ActiveMQ Client: before 5.19.3, from 6.0.0 before \\n6.2.2; Apache ActiveMQ Broker: before 5.19.3, from 6.0.0 before 6.2.2; Apache ActiveMQ All: before 5.19.3, from 6.0.0 \\nbefore 6.2.2.\\n\\nUsers are recommended to upgrade to version 5.19.4 or 6.2.3, which fixes the issue. Note: 5.19.3 and 6.2.2 also fix \\nthis issue, but that is limited to non-Windows environments due to a path separator resolution bug fixed in 5.19.4 and \\n6.2.3.\\n\\nCredit:\\n\\nDawei Wang (finder)\\n\\nReferences:']",
				"category":"general",
				"title":"Synopsis"
			}
		],
		"publisher":null,
		"references":[
			{
				"summary":"nvd cve",
				"category":"external",
				"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-33227"
			},
			{
				"summary":"CVE-2026-33227 vex file",
				"category":"self",
				"url":"https://repo.openeuler.org/security/data/csaf/cve/2026/csaf-openeuler-cve-2026-33227.json"
			},
			{
				"summary":"openEuler-SA-2026-2127",
				"category":"self",
				"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2127"
			},
			{
				"summary":"CVE-2026-33227",
				"category":"self",
				"url":"https://www.openeuler.org/en/security/cve/detail/?cveId=CVE-2026-33227&packageName=activemq"
			}
		],
		"title":"openEuler cve CVE-2026-33227",
		"tracking":{
			"initial_release_date":"2026-05-06T10:48:34+08:00",
			"revision_history":[
				{
					"date":"2026-05-06T10:48:34+08:00",
					"summary":"Initial",
					"number":"1.0.0"
				}
			],
			"generator":{
				"date":"2026-05-06T10:48:34+08:00",
				"engine":{
					"name":"openEuler CSAF Tool V1.0"
				}
			},
			"current_release_date":"2026-05-06T10:48:34+08:00",
			"id":"CVE-2026-33227",
			"version":"1.0.0",
			"status":"interim"
		}
	},
	"product_tree":{
		"branches":[
			{
				"name":"openEuler",
				"category":"vendor",
				"branches":[
					{
						"name":"openEuler",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP3"
									},
									"product_id":"openEuler-24.03-LTS-SP3",
									"name":"openEuler-24.03-LTS-SP3"
								},
								"name":"openEuler-24.03-LTS-SP3",
								"category":"product_version"
							}
						],
						"category":"product_name"
					},
					{
						"name":"src",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP3"
									},
									"product_id":"activemq-5.19.6-1.oe2403sp3.src.rpm",
									"name":"activemq-5.19.6-1.oe2403sp3.src.rpm"
								},
								"name":"activemq-5.19.6-1.oe2403sp3.src.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					},
					{
						"name":"noarch",
						"branches":[
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP3"
									},
									"product_id":"activemq-5.19.6-1.oe2403sp3.noarch.rpm",
									"name":"activemq-5.19.6-1.oe2403sp3.noarch.rpm"
								},
								"name":"activemq-5.19.6-1.oe2403sp3.noarch.rpm",
								"category":"product_version"
							},
							{
								"product":{
									"product_identification_helper":{
										"cpe":"cpe:/a:openEuler:openEuler:24.03-LTS-SP3"
									},
									"product_id":"activemq-javadoc-5.19.6-1.oe2403sp3.noarch.rpm",
									"name":"activemq-javadoc-5.19.6-1.oe2403sp3.noarch.rpm"
								},
								"name":"activemq-javadoc-5.19.6-1.oe2403sp3.noarch.rpm",
								"category":"product_version"
							}
						],
						"category":"architecture"
					}
				]
			}
		],
		"relationships":[
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP3",
				"product_reference":"activemq-5.19.6-1.oe2403sp3.src.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP3:activemq-5.19.6-1.oe2403sp3.src",
					"name":"activemq-5.19.6-1.oe2403sp3.src as a component of openEuler-24.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP3",
				"product_reference":"activemq-5.19.6-1.oe2403sp3.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP3:activemq-5.19.6-1.oe2403sp3.noarch",
					"name":"activemq-5.19.6-1.oe2403sp3.noarch as a component of openEuler-24.03-LTS-SP3"
				},
				"category":"default_component_of"
			},
			{
				"relates_to_product_reference":"openEuler-24.03-LTS-SP3",
				"product_reference":"activemq-javadoc-5.19.6-1.oe2403sp3.noarch.rpm",
				"full_product_name":{
					"product_id":"openEuler-24.03-LTS-SP3:activemq-javadoc-5.19.6-1.oe2403sp3.noarch",
					"name":"activemq-javadoc-5.19.6-1.oe2403sp3.noarch as a component of openEuler-24.03-LTS-SP3"
				},
				"category":"default_component_of"
			}
		]
	},
	"vulnerabilities":[
		{
			"cve":"CVE-2026-33227",
			"notes":[
				{
					"text":"['Severity: low \\n\\nAffected versions:\\n\\n- Apache ActiveMQ Client (org.apache.activemq:activemq-client) before 5.19.3\\n- Apache ActiveMQ Client (org.apache.activemq:activemq-client) 6.0.0 before 6.2.2\\n- Apache ActiveMQ Broker (org.apache.activemq:activemq-broker) before 5.19.3\\n- Apache ActiveMQ Broker (org.apache.activemq:activemq-broker) 6.0.0 before 6.2.2\\n- Apache ActiveMQ (org.apache.activemq:activemq-all) before 5.19.3\\n- Apache ActiveMQ (org.apache.activemq:activemq-all) 6.0.0 before 6.2.2\\n- Apache ActiveMQ Web (org.apache.activemq:activemq-web) before 5.19.3\\n- Apache ActiveMQ Web (org.apache.activemq:activemq-web) 6.0.0 before 6.2.2\\n\\nDescription:\\n\\nImproper validation and restriction of a classpath path name vulnerability in Apache ActiveMQ Client, Apache ActiveMQ \\nBroker, Apache ActiveMQ All.\\n\\nIn two instances (when creating a Stomp consumer and also browsing messages in the Web console) an authenticated user \\nprovided \"key\" value could be constructed to traverse the classpath due to path concatenation. As a result, the \\napplication is exposed to a classpath path resource loading vulnerability that could potentially be chained together \\nwith another attack to lead to exploit.This issue affects Apache ActiveMQ Client: before 5.19.3, from 6.0.0 before \\n6.2.2; Apache ActiveMQ Broker: before 5.19.3, from 6.0.0 before 6.2.2; Apache ActiveMQ All: before 5.19.3, from 6.0.0 \\nbefore 6.2.2.\\n\\nUsers are recommended to upgrade to version 5.19.4 or 6.2.3, which fixes the issue. Note: 5.19.3 and 6.2.2 also fix \\nthis issue, but that is limited to non-Windows environments due to a path separator resolution bug fixed in 5.19.4 and \\n6.2.3.\\n\\nCredit:\\n\\nDawei Wang (finder)\\n\\nReferences:']",
					"category":"description",
					"title":"Vulnerability Description"
				}
			],
			"product_status":{
				"fixed":[
					"openEuler-24.03-LTS-SP3:activemq-5.19.6-1.oe2403sp3.src",
					"openEuler-24.03-LTS-SP3:activemq-5.19.6-1.oe2403sp3.noarch",
					"openEuler-24.03-LTS-SP3:activemq-javadoc-5.19.6-1.oe2403sp3.noarch"
				]
			},
			"remediations":[
				{
					"product_ids":{
						"$ref":"$.vulnerabilities[0].product_status.fixed"
					},
					"details":"activemq security update",
					"category":"vendor_fix",
					"url":"https://www.openeuler.org/zh/security/security-bulletins/detail/?id=openEuler-SA-2026-2127"
				}
			],
			"scores":[
				{
					"cvss_v3":{
						"baseSeverity":"MEDIUM",
						"baseScore":4.3,
						"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
						"version":"3.1"
					},
					"products":{
						"$ref":"$.vulnerabilities[0].product_status.fixed"
					}
				}
			],
			"threats":[
				{
					"details":"Medium",
					"category":"impact"
				}
			],
			"title":"CVE-2026-33227"
		}
	]
}