{
  "threat_severity" : "Moderate",
  "public_date" : "2025-07-17T00:00:00Z",
  "bugzilla" : {
    "description" : "python3.11-django-ansible-base: Sensitive Authenticator Secrets Returned in Clear Text via API in AAP",
    "id" : "2381589",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2381589"
  },
  "cvss3" : {
    "cvss3_base_score" : "4.4",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
    "status" : "verified"
  },
  "cwe" : "CWE-312",
  "details" : [ "A flaw was found in Ansible Automation Platform (AAP) where the Gateway API returns the client secret for certain GitHub Enterprise authenticators in clear text. This vulnerability affects administrators or auditors accessing authenticator configurations. While access is limited to privileged users, the clear text exposure of sensitive credentials increases the risk of accidental leaks or misuse.", "A flaw was found in Ansible Automation Platform (AAP) where the Gateway API returns the client secret for certain GitHub Enterprise authenticators in clear text. This vulnerability affects administrators or auditors accessing authenticator configurations. While access is limited to privileged users, the clear text exposure of sensitive credentials increases the risk of accidental leaks or misuse." ],
  "statement" : "The Red Hat Product Security team has assessed this issue as a Moderate severity. The vulnerability is limited to authenticated and highly privileged users (administrators and auditors), and exploitation does not require user interaction. However, the exposure of OAuth2 client secrets in plain text increases the risk of accidental disclosure or misuse in scenarios involving insider threats or compromised accounts.",
  "acknowledgement" : "Red Hat would like to thank Peter Braun (RedHat) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Ansible Automation Platform 2.5 for RHEL 8",
    "release_date" : "2025-08-04T00:00:00Z",
    "advisory" : "RHSA-2025:12772",
    "cpe" : "cpe:/a:redhat:ansible_automation_platform:2.5::el8",
    "package" : "python3.11-django-ansible-base-0:2.5.20250730-1.el8ap"
  }, {
    "product_name" : "Red Hat Ansible Automation Platform 2.5 for RHEL 9",
    "release_date" : "2025-08-04T00:00:00Z",
    "advisory" : "RHSA-2025:12772",
    "cpe" : "cpe:/a:redhat:ansible_automation_platform:2.5::el9",
    "package" : "python3.11-django-ansible-base-0:2.5.20250730-1.el9ap"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2025-7738\nhttps://nvd.nist.gov/vuln/detail/CVE-2025-7738\nhttps://github.com/ansible/django-ansible-base/commit/e241ea4dce8df577eda15301e0a8e61be647b27b\nhttps://github.com/ansible/django-ansible-base/pull/773" ],
  "name" : "CVE-2025-7738",
  "mitigation" : {
    "value" : "Mitigation for this issue is either not available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}