Staging Environment: Content and features may be unstable or change without notice.
Search for vulnerabilities
Vulnerability details: VCID-mcnd-gx42-p3gk
Vulnerability ID VCID-mcnd-gx42-p3gk
Aliases CVE-2020-13932
GHSA-3h2h-xqr2-2jp7
Summary Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') In Apache ActiveMQ Artemis 2.5.0 to 2.13.0, a specially crafted MQTT packet which has an XSS payload as client-id or topic name can exploit this vulnerability. The XSS payload is being injected into the admin console's browser. The XSS payload is triggered in the diagram plugin; queue node and the info section.
Status Published
Exploitability 0.5
Weighted Severity 6.2
Risk 3.1
Affected and Fixed Packages Package Details
Weaknesses (3)
System Score Found at
cvssv3 6.5 https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13932.json
cvssv3.1 6.1 https://activemq.apache.org/security-advisories.data/CVE-2020-13932-announcement.txt
generic_textual MODERATE https://activemq.apache.org/security-advisories.data/CVE-2020-13932-announcement.txt
epss 0.02552 https://api.first.org/data/v1/epss?cve=CVE-2020-13932
epss 0.02552 https://api.first.org/data/v1/epss?cve=CVE-2020-13932
epss 0.02552 https://api.first.org/data/v1/epss?cve=CVE-2020-13932
epss 0.02552 https://api.first.org/data/v1/epss?cve=CVE-2020-13932
epss 0.02552 https://api.first.org/data/v1/epss?cve=CVE-2020-13932
epss 0.02552 https://api.first.org/data/v1/epss?cve=CVE-2020-13932
epss 0.02552 https://api.first.org/data/v1/epss?cve=CVE-2020-13932
epss 0.02552 https://api.first.org/data/v1/epss?cve=CVE-2020-13932
epss 0.02552 https://api.first.org/data/v1/epss?cve=CVE-2020-13932
epss 0.02552 https://api.first.org/data/v1/epss?cve=CVE-2020-13932
epss 0.02552 https://api.first.org/data/v1/epss?cve=CVE-2020-13932
epss 0.02552 https://api.first.org/data/v1/epss?cve=CVE-2020-13932
epss 0.02552 https://api.first.org/data/v1/epss?cve=CVE-2020-13932
epss 0.02552 https://api.first.org/data/v1/epss?cve=CVE-2020-13932
epss 0.02552 https://api.first.org/data/v1/epss?cve=CVE-2020-13932
epss 0.02552 https://api.first.org/data/v1/epss?cve=CVE-2020-13932
epss 0.02552 https://api.first.org/data/v1/epss?cve=CVE-2020-13932
epss 0.02552 https://api.first.org/data/v1/epss?cve=CVE-2020-13932
cvssv3.1_qr MODERATE https://github.com/advisories/GHSA-3h2h-xqr2-2jp7
cvssv3.1 6.1 https://lists.apache.org/thread.html/r7fcedcc89e5f296b174d6b8c1438c607c30d809c04292e5732d6e4eb@%3Cusers.activemq.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/r7fcedcc89e5f296b174d6b8c1438c607c30d809c04292e5732d6e4eb@%3Cusers.activemq.apache.org%3E
cvssv3.1 6.1 https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E
cvssv3.1 6.1 https://lists.apache.org/thread.html/rc96ad63f148f784c84ea7f0a178c84a8985c6afccabbcd9847a82088@%3Ccommits.activemq.apache.org%3E
generic_textual MODERATE https://lists.apache.org/thread.html/rc96ad63f148f784c84ea7f0a178c84a8985c6afccabbcd9847a82088@%3Ccommits.activemq.apache.org%3E
cvssv3.1 6.1 https://nvd.nist.gov/vuln/detail/CVE-2020-13932
generic_textual MODERATE https://nvd.nist.gov/vuln/detail/CVE-2020-13932
No exploits are available.
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N Found at https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2020-13932.json
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://activemq.apache.org/security-advisories.data/CVE-2020-13932-announcement.txt
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://lists.apache.org/thread.html/r7fcedcc89e5f296b174d6b8c1438c607c30d809c04292e5732d6e4eb@%3Cusers.activemq.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://lists.apache.org/thread.html/rb2fd3bf2dce042e0ab3f3c94c4767c96bb2e7e6737624d63162df36d@%3Ccommits.activemq.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://lists.apache.org/thread.html/rc96ad63f148f784c84ea7f0a178c84a8985c6afccabbcd9847a82088@%3Ccommits.activemq.apache.org%3E
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N Found at https://nvd.nist.gov/vuln/detail/CVE-2020-13932
Attack Vector (AV) Attack Complexity (AC) Privileges Required (PR) User Interaction (UI) Scope (S) Confidentiality Impact (C) Integrity Impact (I) Availability Impact (A)

network

adjacent_network

local

physical

low

high

none

low

high

none

required

unchanged

changed

high

low

none

high

low

none

high

low

none

Exploit Prediction Scoring System (EPSS)
Percentile 0.85419
EPSS Score 0.02552
Published At April 1, 2026, 12:55 p.m.
Date Actor Action Source VulnerableCode Version
2026-04-01T12:49:25.018138+00:00 GitLab Importer Import https://gitlab.com/gitlab-org/advisories-community/-/blob/main/maven/org.apache.activemq/apache-artemis/CVE-2020-13932.yml 38.0.0