A flaw was found in the Red Hat Ansible Automation Platform, Event-Driven Ansible (EDA) Event Streams. This vulnerability allows an authenticated user to gain access to sensitive internal infrastructure headers (such as X-Trusted-Proxy and X-Envoy-*) and event stream URLs via crafted requests and job templates. By exfiltrating these headers, an attacker could spoof trusted requests, escalate privileges, or perform malicious event injection.
| Version | Base score | Base severity | Vector |
|---|---|---|---|
| 3.1 | 6.7 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CAPEC ID | Description |
|---|
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
| Event | Date |
|---|---|
| Reported to Red Hat. | 2025-09-03 07:47:46 |
| Made public. | 2025-09-17 23:59:00 |
| Hyperlink | Resource |
|---|---|
| https://access.redhat.com/errata/RHSA-2025:19201 | vendor-advisory x_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2025:19221 | vendor-advisory x_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2025:23069 | vendor-advisory x_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2025:23131 | vendor-advisory x_refsource_REDHAT |
| https://access.redhat.com/security/cve/CVE-2025-9908 | vdb-entry x_refsource_REDHAT |
| https://bugzilla.redhat.com/show_bug.cgi?id=2392835 | issue-tracking x_refsource_REDHAT |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|