A 13-year-old remote code execution bug in Apache ActiveMQ Classic was recently discovered by Anthropic's Claude, a large language model, in a matter of minutes1. The vulnerability, which has since been fixed, could have allowed an attacker to exploit ActiveMQ's Jolokia API, forcing the server to load a malicious configuration file from the internet and execute arbitrary code. Researchers at Horizon3.ai were able to quickly develop an exploit chain for the bug with the help of AI, demonstrating the potential power and risk of these emerging technologies. The discovery highlights the importance of re-examining legacy code for hidden vulnerabilities, as well as the potential benefits and drawbacks of leveraging AI in security research. This finding matters to security practitioners because it underscores the need to stay vigilant in identifying and patching critical vulnerabilities, particularly in widely-used software like ActiveMQ.