Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9907: Exposure of Sensitive Information to an Unauthorized Actor in Red Hat Red Hat Ansible Automation Platform 2.5 for RHEL 8

0
Medium
VulnerabilityCVE-2025-9907cvecve-2025-9907
Published: Fri Feb 27 2026 (02/27/2026, 07:29:06 UTC)
Source: CVE Database V5
Vendor/Project: Red Hat
Product: Red Hat Ansible Automation Platform 2.5 for RHEL 8

Description

A flaw was found in the Red Hat Ansible Automation Platform, Event-Driven Ansible (EDA) Event Stream API. This vulnerability allows exposure of sensitive client credentials and internal infrastructure headers via the test_headers field when an event stream is in test mode. The possible outcome includes leakage of internal infrastructure details, accidental disclosure of user or system credentials, privilege escalation if high-value tokens are exposed, and persistent sensitive data exposure to all users with read access on the event stream.

AI-Powered Analysis

AILast updated: 02/27/2026, 08:13:17 UTC

Technical Analysis

CVE-2025-9907 is a medium-severity vulnerability discovered in Red Hat Ansible Automation Platform 2.5 running on RHEL 8, specifically within the Event-Driven Ansible (EDA) Event Stream API. The flaw arises from improper handling of the test_headers field when an event stream is operating in test mode. This misconfiguration or design flaw results in the exposure of sensitive client credentials and internal infrastructure headers to unauthorized actors who have read access to the event stream. Because these headers may contain authentication tokens, system credentials, or internal network details, their exposure can lead to significant security risks including privilege escalation and persistent data leakage. The vulnerability requires an attacker to have local access with high privileges (PR:H) but does not require user interaction (UI:N). The attack vector is local (AV:L), meaning exploitation is limited to users with some level of system access. The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H) due to the potential for credential leakage and subsequent unauthorized actions. Although no known exploits are currently reported in the wild, the risk remains significant for organizations relying on Ansible Automation Platform for infrastructure automation and orchestration. The lack of available patches at the time of disclosure underscores the need for immediate mitigation steps. This vulnerability highlights the importance of securing event streams and carefully managing test modes in automation platforms.

Potential Impact

The exposure of sensitive client credentials and internal infrastructure headers can have severe consequences for organizations globally. Leakage of authentication tokens or system credentials can enable attackers to escalate privileges, move laterally within networks, and compromise critical infrastructure components. Persistent exposure of sensitive data to any user with read access on the event stream increases the attack surface and risk of insider threats or accidental data leaks. Organizations using Red Hat Ansible Automation Platform for managing large-scale infrastructure or cloud environments may face operational disruptions, data breaches, and compliance violations if this vulnerability is exploited. The medium CVSS score reflects the requirement for local high privileges to exploit, but the high impact on confidentiality, integrity, and availability means the consequences of exploitation are serious. This vulnerability could also undermine trust in automation workflows and delay critical deployment or remediation activities if exploited.

Mitigation Recommendations

To mitigate CVE-2025-9907, organizations should immediately audit and restrict access to the Event-Driven Ansible event streams, especially those operating in test mode. Limit read permissions strictly to trusted administrators and avoid enabling test mode in production environments. Monitor and log access to event streams to detect any unauthorized read attempts. Apply the latest security updates and patches from Red Hat as soon as they become available. If patches are not yet released, consider disabling or isolating the Event Stream API functionality or deploying compensating controls such as network segmentation and strict access controls around the automation platform. Conduct a thorough review of all credentials and tokens exposed via event streams and rotate any potentially compromised secrets. Implement strict credential management policies and use ephemeral tokens where possible to reduce the impact of leaks. Finally, educate DevOps and security teams about the risks of exposing sensitive data through automation tooling and enforce secure configuration baselines.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
redhat
Date Reserved
2025-09-03T07:44:22.984Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a14e1a32ffcdb8a203afc2

Added to database: 2/27/2026, 7:56:10 AM

Last enriched: 2/27/2026, 8:13:17 AM

Last updated: 2/28/2026, 5:38:26 AM

Views: 14

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses