A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 API Tokens in AAP, are enforced at the Gateway level for Gateway-specific operations. However, this vulnerability allows read-only tokens to perform write operations on backend services (e.g., Controller, Hub, EDA). If this flaw were exploited, an attacker‘s capabilities would only be limited by role based access controls (RBAC).
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

Defense-in-depth practices such as using RBAC to enforce the principle of least privilege and careful token management are essential to reduce the scope of impact. See this KCS article for additional details and strategies. https://access.redhat.com/articles/7136004

History

Thu, 08 Jan 2026 22:45:00 +0000

Type Values Removed Values Added
References

Thu, 08 Jan 2026 19:45:00 +0000

Type Values Removed Values Added
References

Thu, 08 Jan 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 08 Jan 2026 17:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:ansible_automation_platform:2.5::el8
cpe:/a:redhat:ansible_automation_platform:2.5::el9
References

Thu, 08 Jan 2026 14:30:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:ansible_automation_platform:2 cpe:/a:redhat:ansible_automation_platform:2.6::el9
References

Thu, 08 Jan 2026 14:00:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE. A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 API Tokens in AAP, are enforced at the Gateway level for Gateway-specific operations. However, this vulnerability allows read-only tokens to perform write operations on backend services (e.g., Controller, Hub, EDA). If this flaw were exploited, an attacker‘s capabilities would only be limited by role based access controls (RBAC).
Title ansible-automation-platform/aap-gateway: aap-gateway: Read-only Personal Access Token (PAT) bypasses write restrictions Ansible-automation-platform/aap-gateway: aap-gateway: read-only personal access token (pat) bypasses write restrictions
First Time appeared Redhat
Redhat ansible Automation Platform
CPEs cpe:/a:redhat:ansible_automation_platform:2
Vendors & Products Redhat
Redhat ansible Automation Platform
References
Metrics cvssV3_1

{'score': 3.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N'}

cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Fri, 05 Dec 2025 00:15:00 +0000

Type Values Removed Values Added
Description No description is available for this CVE.
Title ansible-automation-platform/aap-gateway: aap-gateway: Read-only Personal Access Token (PAT) bypasses write restrictions
Weaknesses CWE-279
References
Metrics threat_severity

None

cvssV3_1

{'score': 3.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N'}

threat_severity

Low


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-01-09T04:55:20.224Z

Reserved: 2025-12-04T12:33:19.376Z

Link: CVE-2025-14025

cve-icon Vulnrichment

Updated: 2026-01-08T14:17:33.533Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-01-08T14:15:56.510

Modified: 2026-01-08T23:15:43.673

Link: CVE-2025-14025

cve-icon Redhat

Severity : Low

Publid Date: 2025-12-04T10:10:00Z

Links: CVE-2025-14025 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses