CVE-2025-9909

A flaw was found in the Red Hat Ansible Automation Platform Gateway route creation component. This vulnerability allows credential theft via the creation of misleading routes using a double-slash (//) prefix in the gateway_path. A malicious or socially engineered administrator can configure a honey-pot route to intercept and exfiltrate user credentials, potentially maintaining persistent access or creating a backdoor even after their permissions are revoked.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:redhat:ansible_automation_platform:*:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_developer:1.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_developer:1.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_inside:1.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_inside:1.4:*:*:*:*:*:*:*
OR cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*

History

25 Mar 2026, 20:18

Type Values Removed Values Added
First Time Redhat
Redhat enterprise Linux
Redhat ansible Inside
Redhat ansible Automation Platform
Redhat ansible Developer
References () https://access.redhat.com/errata/RHSA-2025:21768 - () https://access.redhat.com/errata/RHSA-2025:21768 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2025:21775 - () https://access.redhat.com/errata/RHSA-2025:21775 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2025:23069 - () https://access.redhat.com/errata/RHSA-2025:23069 - Vendor Advisory
References () https://access.redhat.com/errata/RHSA-2025:23131 - () https://access.redhat.com/errata/RHSA-2025:23131 - Vendor Advisory
References () https://access.redhat.com/security/cve/CVE-2025-9909 - () https://access.redhat.com/security/cve/CVE-2025-9909 - Vendor Advisory
References () https://bugzilla.redhat.com/show_bug.cgi?id=2392836 - () https://bugzilla.redhat.com/show_bug.cgi?id=2392836 - Issue Tracking, Vendor Advisory
Summary
  • (es) Se encontró una falla en el componente de creación de rutas del Gateway de Red Hat Ansible Automation Platform. Esta vulnerabilidad permite el robo de credenciales mediante la creación de rutas engañosas utilizando un prefijo de doble barra (//) en el gateway_path. Un administrador malicioso o que ha sido objeto de ingeniería social puede configurar una ruta de honeypot para interceptar y exfiltrar credenciales de usuario, manteniendo potencialmente acceso persistente o creando una puerta trasera incluso después de que sus permisos sean revocados.
CPE cpe:2.3:a:redhat:ansible_developer:1.2:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_inside:1.4:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_inside:1.3:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_developer:1.3:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:a:redhat:ansible_automation_platform:*:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*

27 Feb 2026, 08:17

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-27 08:17

Updated : 2026-03-25 20:18


NVD link : CVE-2025-9909

Mitre link : CVE-2025-9909

CVE.ORG link : CVE-2025-9909


JSON object : View

Products Affected

redhat

  • enterprise_linux
  • ansible_automation_platform
  • ansible_developer
  • ansible_inside
CWE
CWE-647

Use of Non-Canonical URL Paths for Authorization Decisions