CVE-2025-9909

Medium
|6.7
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to steal user credentials by creating deceptive routes in the Red Hat Ansible Automation Platform, using a specific format that tricks the system. It requires a malicious or manipulated administrator to set up these routes, which can then capture sensitive information even after the attacker's access has been removed.

Technical Description

A flaw was found in the Red Hat Ansible Automation Platform Gateway route creation component. This vulnerability allows credential theft via the creation of misleading routes using a double-slash (//) prefix in the gateway_path. A malicious or socially engineered administrator can configure a honey-pot route to intercept and exfiltrate user credentials, potentially maintaining persistent access or creating a backdoor even after their permissions are revoked.

CVSS Vector Analysis

Attack VectorLocal
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$966($500-$1K)
Vendor Response
Grade APatched in 0 days

Quick Information

Published

Feb 27, 2026

about 1 month ago

Last Modified

Feb 27, 2026

about 1 month ago