Vulnerability Description
OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires authentication. However, the product ships with a default administrative account (admin/ admin) and does not enforce a mandatory password change on first use. After the first successful login, the server continues to accept the default password indefinitely without warning or enforcement. In real-world deployments, this service is often left enabled without changing the default credentials. As a result, a remote attacker with access to the service port could authenticate as an administrator and gain full control of the protocol’s administrative features.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eclipse | Openmq | All versions |
Related Weaknesses (CWE)
References
- https://gitlab.eclipse.org/security/cve-assignment/-/issues/85Issue TrackingVendor Advisory
FAQ
What is CVE-2026-22886?
CVE-2026-22886 is a vulnerability with a CVSS score of 9.8 (CRITICAL). OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires authentication. However, the product ships with a default administrative account (admin/ admin) and does not enforce...
How severe is CVE-2026-22886?
CVE-2026-22886 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-22886?
Check the references section above for vendor advisories and patch information. Affected products include: Eclipse Openmq.