Stored XSS in Apache Artemis
In Apache ActiveMQ Artemis 2.5.0 to 2.13.0, a specially crafted MQTT packet which has an XSS payload as client-id or topic name can exploit this vulnerability. The XSS payload is being injected into the admin console’s browser. The XSS payload is triggered in the diagram plugin; queue node and the info section.
Artemis 2.5.0 to 2.13.0
20 May 2020 reported to the vendor 20 July 2020 coordinated public release of advisory