Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14025: Incorrect Execution-Assigned Permissions in Red Hat Red Hat Ansible Automation Platform 2.5 for RHEL 8

0
High
VulnerabilityCVE-2025-14025cvecve-2025-14025
Published: Thu Jan 08 2026 (01/08/2026, 13:44:04 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Ansible Automation Platform 2.5 for RHEL 8

Description

A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 API Tokens in AAP, are enforced at the Gateway level for Gateway-specific operations. However, this vulnerability allows read-only tokens to perform write operations on backend services (e.g., Controller, Hub, EDA). If this flaw were exploited, an attacker‘s capabilities would only be limited by role based access controls (RBAC).

AI-Powered Analysis

AILast updated: 01/15/2026, 17:10:59 UTC

Technical Analysis

CVE-2025-14025 is a vulnerability discovered in Red Hat Ansible Automation Platform (AAP) version 2.5 running on Red Hat Enterprise Linux 8. The core issue lies in the incorrect enforcement of OAuth2 API token permissions. Specifically, read-only scoped tokens, which should only allow read operations, are enforced at the Gateway level for Gateway-specific operations. However, this enforcement does not extend properly to backend services such as the Controller, Hub, and Event-Driven Automation (EDA) components. Consequently, an attacker possessing a read-only token can perform unauthorized write operations on these backend services. The exploitability is limited by the role-based access control (RBAC) policies configured within the platform, meaning the attacker’s capabilities depend on the roles assigned to the compromised token. The vulnerability does not require user interaction but does require the attacker to have at least low privileges (PR:L). The CVSS v3.1 base score is 8.5, reflecting a high severity due to network attack vector, high impact on confidentiality, integrity, and availability, and the scope change from the gateway to backend services. No public exploits have been reported yet, but the flaw presents a significant risk to organizations using AAP for automation tasks, as unauthorized write access could lead to configuration changes, data manipulation, or disruption of automation workflows.

Potential Impact

For European organizations, this vulnerability poses a significant risk to the security and stability of IT automation environments. Ansible Automation Platform is widely used in enterprises for managing infrastructure, deploying applications, and orchestrating complex workflows. Unauthorized write access via compromised read-only tokens could allow attackers to alter automation scripts, inject malicious configurations, or disrupt critical operational processes. This could lead to data breaches, service outages, or the propagation of further attacks within the network. The impact is particularly severe in sectors with stringent compliance requirements such as finance, healthcare, and critical infrastructure, where automation platforms are integral to operational continuity. Additionally, the ability to bypass intended permission scopes undermines trust in RBAC implementations, potentially exposing sensitive systems to insider threats or external attackers who gain limited access.

Mitigation Recommendations

1. Apply official patches from Red Hat as soon as they become available to address the permission enforcement flaw. 2. Until patches are deployed, restrict the issuance of OAuth2 API tokens to the minimum necessary scopes and avoid granting read-only tokens to untrusted users or services. 3. Implement strict RBAC policies with the principle of least privilege, regularly reviewing roles and permissions to minimize potential damage from token misuse. 4. Monitor API gateway and backend service logs for anomalous write operations originating from tokens designated as read-only, using automated alerting where possible. 5. Consider network segmentation to isolate automation platform components and reduce the attack surface. 6. Conduct security audits and penetration testing focused on token management and API access controls within the Ansible Automation Platform environment. 7. Educate administrators and developers about the risks of token misuse and the importance of adhering to security best practices in automation workflows.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-12-04T12:33:19.376Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695fb9abc901b06321f2a5e3

Added to database: 1/8/2026, 2:05:31 PM

Last enriched: 1/15/2026, 5:10:59 PM

Last updated: 2/7/2026, 6:51:37 AM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats