Red Hat fixes multiple security flaws in Ansible Automation Platform

Estimated read time 2 min read

Red Hat has released a security update this week for its Ansible Automation Platform 2.5. The patches fix multiple serious vulnerabilities, including two in the Event‑Driven Ansible (EDA) component and another in the gateway proxy. Here’s what you need to know.

What got fixed

CVE‑2025‑49520 – a critical argument injection flaw in the EDA module. Unsanitized Git URLs could let an authenticated attacker inject extra commands into a git ls-remote call. That could lead to code execution on EDA workers. In Kubernetes or OpenShift setups, it might even allow theft of service account tokens.

CVE‑2025‑49521 – a Jinja2 template injection flaw in the same EDA part. An attacker could craft branch or refspec values containing templates. These get evaluated and allow arbitrary command execution or file access on the EDA worker, again risking service account token exposure .

CVE‑2025‑22871 – a request smuggling issue in the automation gateway proxy and receptor components, due to weak handling of invalid chunked HTTP data .

According to Red Hat, the two EDA flaws received a high severity score of 8.8 (CVSS 3.1). They require only low privileges and can be exploited remotely. The proxy issue is rated “Important.

Who’s affected

Systems running Ansible Automation Platform 2.5 on RHEL 8 or 9, including various architectures (x86_64, s390x, ppc64le, aarch64), are affected. This covers installations via RPM, container-based sets, and EDA controllers

What to do now

  • Update to the patched versions listed in RHSA‑2025:9986. That includes new builds for automation‑gateway, automation‑eda‑controller, receptor, and related packages.
  • Use vulnerability scanners like Nessus plugin 241026 or Tenable IDS to detect outdated EDA components.
  • If you run EDA on Kubernetes/OpenShift, pay extra attention to update now. Don’t rely on network isolation alone.

Why it matters

EDA lets administrators automate tasks based on triggers and events. It’s a key part of modern DevOps workflows. If someone tampered with Git URLs or branch definitions, they could trick the system into running harmful commands. In a Kubernetes context, that could mean access to critical tokens and control over cluster components.

Request smuggling, though less flashy, can bypass proxies or filters and help attackers reach internal services. That may open the door to wider attacks.

Who is affected

The update impacts Ansible Automation Platform 2.5 installations on RHEL 8 and 9, covering all CPU architectures: x86_64, s390x, ppc64le, and aarch64. This applies across RPM-based installs, container setups, and EDA controller components

June Bauer

Pop cultureaholic, Technology expert, Web fanatic and a Social media geek. If you have any questions or comments please feel free to email her at june@thecoinspost.com or contact her on X @JuneTBauer1

You May Also Like

More From Author