{
  "threat_severity" : "Important",
  "public_date" : "2025-12-04T10:10:00Z",
  "bugzilla" : {
    "description" : "ansible-automation-platform/aap-gateway: aap-gateway: Read-only Personal Access Token (PAT) bypasses write restrictions",
    "id" : "2418785",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2418785"
  },
  "cvss3" : {
    "cvss3_base_score" : "8.5",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
    "status" : "verified"
  },
  "cwe" : "CWE-279",
  "details" : [ "A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 API Tokens in AAP, are enforced at the Gateway level for Gateway-specific operations. However, this vulnerability allows read-only tokens to perform write operations on backend services (e.g., Controller, Hub, EDA). If this flaw were exploited, an attacker‘s capabilities would only be limited by role based access controls (RBAC).", "A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 API Tokens in AAP, are enforced at the Gateway level for Gateway-specific operations. However, this vulnerability allows read-only tokens to perform write operations on backend services (e.g., Controller, Hub, EDA). If this flaw were exploited, an attacker‘s capabilities would only be limited by role based access controls (RBAC)." ],
  "statement" : "Red Hat rates the severity as Important and not Critical because an attacker already needs a valid token belonging to a user account. If the user has additional permissions beyond read-only access, an attacker can bypass the read-only limitation of the token. \nThe potential impact of this vulnerability depends on an organization’s permission model. Organizations face the most significant risk if read-only tokens are granted to individual users, instead of dedicated service accounts with restricted permissions. In the higher risk situation, attackers could create or update execution environments, projects, or run job templates.",
  "affected_release" : [ {
    "product_name" : "Red Hat Ansible Automation Platform 2.5 for RHEL 8",
    "release_date" : "2026-01-08T00:00:00Z",
    "advisory" : "RHSA-2026:0361",
    "cpe" : "cpe:/a:redhat:ansible_automation_platform:2.5::el8",
    "package" : "automation-gateway-0:2.5.20260106-1.el8ap"
  }, {
    "product_name" : "Red Hat Ansible Automation Platform 2.5 for RHEL 9",
    "release_date" : "2026-01-08T00:00:00Z",
    "advisory" : "RHSA-2026:0361",
    "cpe" : "cpe:/a:redhat:ansible_automation_platform:2.5::el9",
    "package" : "automation-gateway-0:2.5.20260106-1.el9ap"
  }, {
    "product_name" : "Red Hat Ansible Automation Platform 2.6 for RHEL 9",
    "release_date" : "2026-01-08T00:00:00Z",
    "advisory" : "RHSA-2026:0360",
    "cpe" : "cpe:/a:redhat:ansible_automation_platform:2.6::el9",
    "package" : "automation-gateway-0:2.6.20260106-1.el9ap"
  }, {
    "product_name" : "Red Hat Ansible Automation Platform 2.5",
    "release_date" : "2026-01-08T00:00:00Z",
    "advisory" : "RHSA-2026:0409",
    "cpe" : "cpe:/a:redhat:ansible_automation_platform:2.5::el8",
    "package" : "ansible-automation-platform-25/gateway-rhel8:sha256:2df290b61d7aac08deec2973d0a9b98788f6b619e974af0b3f4b61c759c7e464"
  }, {
    "product_name" : "Red Hat Ansible Automation Platform 2.6",
    "release_date" : "2026-01-08T00:00:00Z",
    "advisory" : "RHSA-2026:0408",
    "cpe" : "cpe:/a:redhat:ansible_automation_platform:2.6::el9",
    "package" : "ansible-automation-platform-26/gateway-rhel9:sha256:6356059beeaa5677adb94c9c5a99674fc1bd558f7714b1b338f215b7c58c5f42"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-14025\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-14025\nhttps://access.redhat.com/articles/7136004" ],
  "name" : "CVE-2025-14025",
  "mitigation" : {
    "value" : "Defense-in-depth practices such as using RBAC to enforce the principle of least privilege and careful token management are essential to reduce the scope of impact. See this KCS article for additional details and strategies. https://access.redhat.com/articles/7136004",
    "lang" : "en:us"
  },
  "csaw" : false
}