OpenMQ exposes a TCP-based management service (imqbrokerd) that by default requires
authentication. However, the product ships with a default administrative account (admin/
admin) and does not enforce a mandatory password change on first use. After the first
successful login, the server continues to accept the default password indefinitely without
warning or enforcement.

In real-world deployments, this service is often left enabled without changing the default
credentials. As a result, a remote attacker with access to the service port could authenticate
as an administrator and gain full control of the protocol’s administrative features.

Published: 2026-03-03

CVSS: 9.8

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Download CVE-2026-22886 POC (Proof-of-Concept) here:

Tip: Download official Tor Browser at https://www.torproject.org/download/ to access .onion links.

Check our portfolio:

https://dnacompany.com/poc-406-cve-2026-27476/

https://dnacompany.com/poc-135-cve-2026-1709/

https://dnacompany.com/poc-716-cve-2026-27028/

https://dnacompany.com/poc-509-cve-2026-2944/

https://dnacompany.com/poc-364-cve-2019-25362/