CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

redhat

ansible_automation_platform

23 known vulnerabilities · sorted by CVSS score

CVE-2021-4112
HIGH8.8

A flaw was found in ansible-tower where the default installation is vulnerable to job isolation escape. This flaw allows an attacker to elevate the privilege from a low privileged user to an AWX user from outside the isolated environment.

redhat / ansible_automation_platform_early_access+4
Local
Published Aug 25, 2022
Page 1 of 2
CVE-2023-44487
HIGH7.5

The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.

ietf / http+291
Network
Published Oct 10, 2023
CVE-2021-20228
HIGH7.5

A flaw was found in the Ansible Engine 2.9.18, where sensitive info is not masked by default and is not protected by the no_log feature when using the sub-option feature of the basic.py module. This flaw allows an attacker to obtain sensitive information. The highest threat from this vulnerability is to confidentiality.

redhat / ansible_engine+5
Network
Published Apr 29, 2021
CVE-2023-50782
HIGH7.5

A flaw was found in the python-cryptography package. This issue may allow a remote attacker to decrypt captured messages in TLS servers that use RSA key exchanges, which may lead to exposure of confidential or sensitive data.

redhat / ansible_automation_platform+6
Network
Published Feb 5, 2024
CVE-2023-3971
HIGH7.3

An HTML injection flaw was found in Controller in the user interface settings. This flaw allows an attacker to capture credentials by creating a custom login page by injecting HTML, resulting in a complete compromise.

redhat / ansible_automation_controller+5
Network
Published Oct 4, 2023
CVE-2023-4237
HIGH7.3

A flaw was found in the Ansible Automation Platform. When creating a new keypair, the ec2_key module prints out the private key directly to the standard output. This flaw allows an attacker to fetch those keys from the log files, compromising the system's confidentiality, integrity, and availability.

redhat / ansible_automation_platform+1
Local
Published Oct 4, 2023
CVE-2023-5764
HIGH7.1

A template injection flaw was found in Ansible where a user's controller internal templating operations may remove the unsafe designation from template data. This issue could allow an attacker to use a specially crafted file to introduce templating injection when supplying templating data.

redhat / ansible+11
Local
Published Dec 12, 2023
CVE-2021-3583
HIGH7.1

A flaw was found in Ansible, where a user's controller is vulnerable to template injection. This issue can occur through facts used in the template if the user is trying to put templates in multi-line YAML strings and the facts being handled do not routinely include special template characters. This flaw allows attackers to perform command injection, which discloses sensitive information. The highest threat from this vulnerability is to confidentiality and integrity.

redhat / ansible_automation_platform+2
Local
Published Sep 22, 2021
CVE-2025-9909
MEDIUM6.7

A flaw was found in the Red Hat Ansible Automation Platform Gateway route creation component. This vulnerability allows credential theft via the creation of misleading routes using a double-slash (//) prefix in the gateway_path. A malicious or socially engineered administrator can configure a honey-pot route to intercept and exfiltrate user credentials, potentially maintaining persistent access or creating a backdoor even after their permissions are revoked.

redhat / ansible_automation_platform+4
Local
Published Feb 27, 2026
CVE-2025-9907
MEDIUM6.7

A flaw was found in the Red Hat Ansible Automation Platform, Event-Driven Ansible (EDA) Event Stream API. This vulnerability allows exposure of sensitive client credentials and internal infrastructure headers via the test_headers field when an event stream is in test mode. The possible outcome includes leakage of internal infrastructure details, accidental disclosure of user or system credentials, privilege escalation if high-value tokens are exposed, and persistent sensitive data exposure to all users with read access on the event stream.

redhat / ansible_automation_platform+4
Local
Published Feb 27, 2026
CVE-2025-9908
MEDIUM6.7

A flaw was found in the Red Hat Ansible Automation Platform, Event-Driven Ansible (EDA) Event Streams. This vulnerability allows an authenticated user to gain access to sensitive internal infrastructure headers (such as X-Trusted-Proxy and X-Envoy-*) and event stream URLs via crafted requests and job templates. By exfiltrating these headers, an attacker could spoof trusted requests, escalate privileges, or perform malicious event injection.

redhat / ansible_automation_platform+4
Local
Published Feb 27, 2026
CVE-2022-1632
MEDIUM6.5

An Improper Certificate Validation attack was found in Openshift. A re-encrypt Route with destinationCACertificate explicitly set to the default serviceCA skips internal Service TLS certificate validation. This flaw allows an attacker to exploit an invalid certificate, resulting in a loss of confidentiality.

redhat / ansible_automation_platform+3
Network
Published Sep 1, 2022
CVE-2022-2568
MEDIUM6.5

A privilege escalation flaw was found in the Ansible Automation Platform. This flaw allows a remote authenticated user with 'change user' permissions to modify the account settings of the superuser account and also remove the superuser privileges.

redhat / ansible_automation_platform+2
Network
Published Aug 18, 2022
CVE-2023-5115
MEDIUM6.3

An absolute path traversal attack exists in the Ansible automation platform. This flaw allows an attacker to craft a malicious Ansible role and make the victim execute the role. A symlink can be used to overwrite a file outside of the extraction path.

redhat / ansible_automation_platform+7
Network
Published Dec 18, 2023
CVE-2023-4380
MEDIUM6.3

A logic flaw exists in Ansible Automation platform. Whenever a private project is created with incorrect credentials, they are logged in plaintext. This flaw allows an attacker to retrieve the credentials from the log, resulting in the loss of confidentiality, integrity, and availability.

redhat / ansible_automation_platform+2
Network
Published Oct 4, 2023
CVE-2023-5189
MEDIUM6.3

A path traversal vulnerability exists in Ansible when extracting tarballs. An attacker could craft a malicious tarball so that when using the galaxy importer of Ansible Automation Hub, a symlink could be dropped on the disk, resulting in files being overwritten.

redhat / ansible_automation_platform+1
Network
Published Nov 14, 2023
CVE-2024-10033
MEDIUM6.1

A vulnerability was found in aap-gateway. A Cross-site Scripting (XSS) vulnerability exists in the gateway component. This flaw allows a malicious user to perform actions that impact users by using the "?next=" in a URL, which can lead to redirecting, injecting malicious script, stealing sessions and data.

redhat / ansible_automation_platform+2
Network
Published Oct 16, 2024
CVE-2021-3681
MEDIUM5.5

A flaw was found in Ansible Galaxy Collections. When collections are built manually, any files in the repository directory that are not explicitly excluded via the ``build_ignore`` list in "galaxy.yml" include files in the ``.tar.gz`` file. This contains sensitive info, such as the user's Ansible Galaxy API key and any secrets in ``ansible`` or ``ansible-playbook`` verbose output without the``no_log`` redaction. Currently, there is no way to deprecate a Collection Or delete a Collection Version. Once published, anyone who downloads or installs the collection can view the secrets.

redhat / ansible_automation_platform+1
Local
Published Apr 18, 2022
CVE-2022-3644
MEDIUM5.5

The collection remote for pulp_ansible stores tokens in plaintext instead of using pulp's encrypted field and exposes them in read/write mode via the API () instead of marking it as write only.

pulpproject / pulp_ansible+3
Local
Published Oct 25, 2022
CVE-2024-0690
MEDIUM5.0

An information disclosure flaw was found in ansible-core due to a failure to respect the ANSIBLE_NO_LOG configuration in some scenarios. Information is still included in the output in certain tasks, such as loop items. Depending on the task, this issue may include sensitive information, such as decrypted secret values.

redhat / ansible+9
Local
Published Feb 6, 2024