CVE-2025-49521

8.8 HIGH

📋 TL;DR

This vulnerability allows authenticated users of Ansible Automation Platform's EDA component to inject malicious Jinja2 templates via Git branch or refspec values. Successful exploitation enables remote code execution and sensitive file access on EDA workers, potentially leading to service account token theft in OpenShift environments. Affected users include organizations using vulnerable versions of Ansible Automation Platform with EDA enabled.

💻 Affected Systems

Products:
  • Ansible Automation Platform
  • Red Hat Ansible Automation Platform
Versions: Ansible Automation Platform 2.4 before 2.4.8, 2.3 before 2.3.12, 2.2 before 2.2.19
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires EDA (Event-Driven Ansible) component to be enabled and configured with Git-based event sources. Authentication to the platform is required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of EDA worker nodes, theft of service account tokens in OpenShift environments leading to cluster-wide compromise, and lateral movement to other systems.

🟠

Likely Case

Authenticated attackers executing arbitrary commands on EDA workers, accessing sensitive files, and potentially escalating privileges within the automation platform.

🟢

If Mitigated

Limited impact with proper network segmentation, minimal service account permissions, and restricted user access to EDA components.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the Ansible Automation Platform and knowledge of Git branch/refspec parameter injection. The vulnerability is in template evaluation logic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Ansible Automation Platform 2.4.8, 2.3.12, or 2.2.19

Vendor Advisory: https://access.redhat.com/errata/RHSA-2025:9986

Restart Required: Yes

Instructions:

1. Update to patched version via Red Hat Satellite or repository. 2. Apply the update to all controller and EDA worker nodes. 3. Restart affected services including automation controller and EDA services. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable Git-based event sources

linux

Temporarily disable or remove Git-based event source configurations in EDA until patching can be completed.

ansible-automation-platform-manager disable-git-events

Restrict user permissions

all

Limit which users can create or modify EDA rulebooks and event sources to only trusted administrators.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate EDA workers from sensitive systems.
  • Apply principle of least privilege to service accounts and restrict file system access on EDA workers.

🔍 How to Verify

Check if Vulnerable:

Check Ansible Automation Platform version: 'rpm -q ansible-automation-platform' and verify if it's below 2.4.8, 2.3.12, or 2.2.19.

Check Version:

rpm -q ansible-automation-platform --queryformat '%{VERSION}-%{RELEASE}\n'

Verify Fix Applied:

Verify version is 2.4.8, 2.3.12, or 2.2.19 or higher: 'rpm -q ansible-automation-platform' and check for version string.

📡 Detection & Monitoring

Log Indicators:

  • Unusual Git branch names containing Jinja2 template syntax in EDA logs
  • Unexpected command execution patterns from EDA worker processes
  • Failed authentication attempts followed by Git event source modifications

Network Indicators:

  • Unusual outbound connections from EDA workers to external systems
  • Suspicious file transfers from EDA worker nodes

SIEM Query:

source="eda.log" AND ("git branch" OR "refspec") AND ("{{.*}}" OR "{%")

🔗 References

📤 Share & Export