CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

redhat

ansible

38 known vulnerabilities · sorted by CVSS score

CVE-2014-4966
CRITICAL9.8

Ansible before 1.6.7 does not prevent inventory data with "{{" and "lookup" substrings, and does not prevent remote data with "{{" substrings, which allows remote attackers to execute arbitrary code via (1) crafted lookup('pipe') calls or (2) crafted Jinja2 data.

redhat / ansible
Network
Published Feb 18, 2020
Page 1 of 2
CVE-2014-4967
CRITICAL9.8

Multiple argument injection vulnerabilities in Ansible before 1.6.7 allow remote attackers to execute arbitrary code by leveraging access to an Ansible managed host and providing a crafted fact, as demonstrated by a fact with (1) a trailing " src=" clause, (2) a trailing " temp=" clause, or (3) a trailing " validate=" clause accompanied by a shell command.

redhat / ansible
Network
Published Feb 18, 2020
CVE-2014-4657
CRITICAL9.8

The safe_eval function in Ansible before 1.5.4 does not properly restrict the code subset, which allows remote attackers to execute arbitrary code via crafted instructions.

redhat / ansible
Network
Published Feb 20, 2020
CVE-2014-4678
CRITICAL9.8

The safe_eval function in Ansible before 1.6.4 does not properly restrict the code subset, which allows remote attackers to execute arbitrary code via crafted instructions. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-4657.

redhat / ansible+3
Network
Published Feb 20, 2020
CVE-2016-9587
HIGH8.1

Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.

redhat / ansible+2
Network
Published Apr 24, 2018
CVE-2017-7466
HIGH8.0

Ansible before version 2.3 has an input validation vulnerability in the handling of data sent from client systems. An attacker with control over a client system being managed by Ansible, and the ability to send facts back to the Ansible server, could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.

redhat / ansible+2
Network
Published Jun 22, 2018
CVE-2020-10684
HIGH7.9

A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection.

redhat / ansible+11
Local
Published Mar 24, 2020
CVE-2016-8628
HIGH7.6

Ansible before version 2.2.0 fails to properly sanitize fact variables sent from the Ansible controller. An attacker with the ability to create special variables on the controller could execute arbitrary commands on Ansible clients as the user Ansible runs as.

redhat / ansible
Network
Published Jul 31, 2018
CVE-2014-2686
HIGH7.5

Ansible prior to 1.5.4 mishandles the evaluation of some strings.

redhat / ansible
Network
Published Jan 9, 2020
CVE-2022-3697
HIGH7.5

A flaw was found in Ansible in the amazon.aws collection when using the tower_callback parameter from the amazon.aws.ec2_instance module. This flaw allows an attacker to take advantage of this issue as the module is handling the parameter insecurely, leading to the password leaking in the logs.

redhat / ansible+2
Network
Published Oct 28, 2022
CVE-2013-2233
HIGH7.4

Ansible before 1.2.1 makes it easier for remote attackers to conduct man-in-the-middle attacks by leveraging failure to cache SSH host keys.

redhat / ansible
Network
Published May 4, 2018
CVE-2019-14904
HIGH7.3

A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.

redhat / ansible+4
Local
Published Aug 26, 2020
CVE-2023-5764
HIGH7.1

A template injection flaw was found in Ansible where a user's controller internal templating operations may remove the unsafe designation from template data. This issue could allow an attacker to use a specially crafted file to introduce templating injection when supplying templating data.

redhat / ansible+11
Local
Published Dec 12, 2023
CVE-2020-25636
MEDIUM6.6

A flaw was found in Ansible Base when using the aws_ssm connection plugin as there is no namespace separation for file transfers. Files are written directly to the root bucket, making possible to have collisions when running multiple ansible processes. This issue affects mainly the service availability.

redhat / ansible
Local
Published Oct 5, 2020
CVE-2019-14864
MEDIUM6.5

Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.

redhat / ansible+11
Network
Published Jan 2, 2020
CVE-2019-10217
MEDIUM6.5

A flaw was found in ansible 2.8.0 before 2.8.4. Fields managing sensitive data should be set as such by no_log feature. Some of these fields in GCP modules are not set properly. service_account_contents() which is common class for all gcp modules is not setting no_log to True. Any sensitive data managed by that function would be leak as an output when running ansible playbooks.

redhat / ansible
Network
Published Nov 25, 2019
CVE-2019-10206
MEDIUM6.5

ansible-playbook -k and ansible cli tools, all versions 2.8.x before 2.8.4, all 2.7.x before 2.7.13 and all 2.6.x before 2.6.19, prompt passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them.

redhat / ansible+5
Network
Published Nov 22, 2019
CVE-2019-14856
MEDIUM6.5

ansible before versions 2.8.6, 2.7.14, 2.6.20 is vulnerable to a None

redhat / ansible+5
Network
Published Nov 26, 2019
CVE-2016-8614
MEDIUM6.3

A flaw was found in Ansible before version 2.2.0. The apt_key module does not properly verify key fingerprints, allowing remote adversary to create an OpenPGP key which matches the short key ID and inject this key instead of the correct key.

redhat / ansible
Network
Published Jul 31, 2018
CVE-2021-3447
MEDIUM5.5

A flaw was found in several ansible modules, where parameters containing credentials, such as secrets, were being logged in plain-text on managed nodes, as well as being made visible on the controller node when run in verbose mode. These parameters were not protected by the no_log feature. An attacker can take advantage of this information to steal those credentials, provided when they have access to the log files containing them. The highest threat from this vulnerability is to data confidentiality. This flaw affects Red Hat Ansible Automation Platform in versions before 1.2.2 and Ansible Tower in versions before 3.8.2.

redhat / ansible+4
Local
Published Apr 1, 2021