{"api_version":"1","generated_at":"2026-04-09T20:35:45+00:00","cve":"CVE-2026-40046","urls":{"html":"https://cve.report/CVE-2026-40046","api":"https://cve.report/api/cve/CVE-2026-40046.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-40046","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-40046"},"summary":{"title":"Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT: Missing fix for CVE-2025-66168: MQTT control packet remaining length field is not properly validated","description":"Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT.\n\nThe fix for \"CVE-2025-66168: MQTT control packet remaining length field is not properly validated\" was only applied to 5.19.2 (and future 5.19.x) releases but was missed for all 6.0.0+ versions.\n\n\nThis issue affects Apache ActiveMQ: from 6.0.0 before 6.2.4; Apache ActiveMQ All: from 6.0.0 before 6.2.4; Apache ActiveMQ MQTT: from 6.0.0 before 6.2.4.\n\n\n\nUsers are recommended to upgrade to version 6.2.4 or a 5.19.x version starting with 5.19.2 or later (currently latest is 5.19.5), which fixes the issue.","state":"PUBLISHED","assigner":"apache","published_at":"2026-04-09 17:16:31","updated_at":"2026-04-09 17:16:31"},"problem_types":["CWE-190","CWE-190 CWE-190 Integer Overflow or Wraparound"],"metrics":[],"references":[{"url":"https://activemq.apache.org/security-advisories.data/CVE-2026-40046-announcement.txt","name":"https://activemq.apache.org/security-advisories.data/CVE-2026-40046-announcement.txt","refsource":"security@apache.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://lists.apache.org/thread/zdntj5rcgjjzrpow84o339lzldy68zrg","name":"https://lists.apache.org/thread/zdntj5rcgjjzrpow84o339lzldy68zrg","refsource":"security@apache.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2025-66168","name":"https://www.cve.org/CVERecord?id=CVE-2025-66168","refsource":"security@apache.org","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-40046","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-40046","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Apache Software Foundation","product":"Apache ActiveMQ","version":"affected 6.0.0 6.2.4 semver","platforms":[]},{"source":"CNA","vendor":"Apache Software Foundation","product":"Apache ActiveMQ All","version":"affected 6.0.0 6.2.4 semver","platforms":[]},{"source":"CNA","vendor":"Apache Software Foundation","product":"Apache ActiveMQ MQTT","version":"affected 6.0.0 6.2.4 semver","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Adrien Bernard","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"collectionURL":"https://repo.maven.apache.org/maven2","defaultStatus":"unaffected","packageName":"org.apache.activemq:apache-activemq","product":"Apache ActiveMQ","vendor":"Apache Software Foundation","versions":[{"lessThan":"6.2.4","status":"affected","version":"6.0.0","versionType":"semver"}]},{"collectionURL":"https://repo.maven.apache.org/maven2","defaultStatus":"unaffected","packageName":"org.apache.activemq:activemq-all","product":"Apache ActiveMQ All","vendor":"Apache Software Foundation","versions":[{"lessThan":"6.2.4","status":"affected","version":"6.0.0","versionType":"semver"}]},{"collectionURL":"https://repo.maven.apache.org/maven2","defaultStatus":"unaffected","packageName":"org.apache.activemq:activemq-mqtt","product":"Apache ActiveMQ MQTT","vendor":"Apache Software Foundation","versions":[{"lessThan":"6.2.4","status":"affected","version":"6.0.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Adrien Bernard"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>\n\n</p><p>Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT.</p>The fix for \"CVE-2025-66168: MQTT control packet remaining length field is not properly validated\" was only applied to 5.19.2 (and future 5.19.x) releases but was missed for all 6.0.0+ versions.<br><p>\n\n<span style=\"background-color: rgb(255, 255, 255);\">This issue affects Apache ActiveMQ: from 6.0.0 before 6.2.4; Apache ActiveMQ All: from 6.0.0 before 6.2.4; Apache ActiveMQ MQTT: from 6.0.0 before 6.2.4.</span>\n\n</p><p>Users are recommended to upgrade to version 6.2.4 or a 5.19.x version starting with 5.19.2 or later (currently latest is 5.19.5), which fixes the issue.</p><p></p>"}],"value":"Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT.\n\nThe fix for \"CVE-2025-66168: MQTT control packet remaining length field is not properly validated\" was only applied to 5.19.2 (and future 5.19.x) releases but was missed for all 6.0.0+ versions.\n\n\nThis issue affects Apache ActiveMQ: from 6.0.0 before 6.2.4; Apache ActiveMQ All: from 6.0.0 before 6.2.4; Apache ActiveMQ MQTT: from 6.0.0 before 6.2.4.\n\n\n\nUsers are recommended to upgrade to version 6.2.4 or a 5.19.x version starting with 5.19.2 or later (currently latest is 5.19.5), which fixes the issue."}],"metrics":[{"other":{"content":{"text":"moderate"},"type":"Textual description of severity"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-190","description":"CWE-190 Integer Overflow or Wraparound","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-09T15:58:32.966Z","orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache"},"references":[{"tags":["related"],"url":"https://www.cve.org/CVERecord?id=CVE-2025-66168"},{"tags":["vendor-advisory"],"url":"https://activemq.apache.org/security-advisories.data/CVE-2026-40046-announcement.txt"},{"tags":["vendor-advisory"],"url":"https://lists.apache.org/thread/zdntj5rcgjjzrpow84o339lzldy68zrg"}],"source":{"discovery":"UNKNOWN"},"title":"Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT: Missing fix for CVE-2025-66168: MQTT control packet remaining length field is not properly validated","x_generator":{"engine":"Vulnogram 0.2.0"}}},"cveMetadata":{"assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","assignerShortName":"apache","cveId":"CVE-2026-40046","datePublished":"2026-04-09T15:58:32.966Z","dateReserved":"2026-04-08T15:21:53.253Z","dateUpdated":"2026-04-09T15:58:32.966Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-09 17:16:31","lastModifiedDate":"2026-04-09 17:16:31","problem_types":["CWE-190","CWE-190 CWE-190 Integer Overflow or Wraparound"],"metrics":[],"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"40046","Ordinal":"1","Title":"Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT: Miss","CVE":"CVE-2026-40046","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"40046","Ordinal":"1","NoteData":"Integer Overflow or Wraparound vulnerability in Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT.\n\nThe fix for \"CVE-2025-66168: MQTT control packet remaining length field is not properly validated\" was only applied to 5.19.2 (and future 5.19.x) releases but was missed for all 6.0.0+ versions.\n\n\nThis issue affects Apache ActiveMQ: from 6.0.0 before 6.2.4; Apache ActiveMQ All: from 6.0.0 before 6.2.4; Apache ActiveMQ MQTT: from 6.0.0 before 6.2.4.\n\n\n\nUsers are recommended to upgrade to version 6.2.4 or a 5.19.x version starting with 5.19.2 or later (currently latest is 5.19.5), which fixes the issue.","Type":"Description","Title":"Apache ActiveMQ, Apache ActiveMQ All, Apache ActiveMQ MQTT: Miss"}]}}}