Report: Update: CVE-2026-9133 - Arbitrary file read in rabbitmq-aws plugin
CVE ID :CVE-2026-9133 Published : May 20, 2026, 8:16 p.m. | 25 minutes ago Description :Active debug code exists in the ARN resolver of amazon-mq rabbitmq-aws before version 0.2.1. A debug ARN scheme (arn:aws-debug:file) accepted by the PUT /api/aws/arn/validate validation endpoint might allow remote authenticated users to perform arbitrary file reads on any file accessible to the RabbitMQ process. To remediate this issue, customers should upgrade to version 0.2.1 of rabbitmq-aws. If RabbitMQ is configured to use TLS for connections, we also recommend rotating any associated private certificate keys. Severity: 8.3 | HIGH Visit the link for more details, such as CVSS details, affected products, timeline, and more...