A flaw was found in the Red Hat Ansible Automation Platform Gateway route creation component. This vulnerability allows credential theft via the creation of misleading routes using a double-slash (//) prefix in the gateway_path. A malicious or socially engineered administrator can configure a honey-pot route to intercept and exfiltrate user credentials, potentially maintaining persistent access or creating a backdoor even after their permissions are revoked.
| Version | Base score | Base severity | Vector |
|---|---|---|---|
| 3.1 | 6.7 | MEDIUM | CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| CAPEC ID | Description |
|---|
Mitigation for this issue is either not available or the currently available options do not meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.
| Event | Date |
|---|---|
| Reported to Red Hat. | 2025-09-03 07:53:49 |
| Made public. | 2025-09-17 23:59:00 |
| Hyperlink | Resource |
|---|---|
| https://access.redhat.com/errata/RHSA-2025:21768 | vendor-advisory x_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2025:21775 | vendor-advisory x_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2025:23069 | vendor-advisory x_refsource_REDHAT |
| https://access.redhat.com/errata/RHSA-2025:23131 | vendor-advisory x_refsource_REDHAT |
| https://access.redhat.com/security/cve/CVE-2025-9909 | vdb-entry x_refsource_REDHAT |
| https://bugzilla.redhat.com/show_bug.cgi?id=2392836 | issue-tracking x_refsource_REDHAT |
| Version | Base score | Base severity | Vector |
|---|
| CAPEC ID | Description |
|---|
| Event | Date |
|---|
| Hyperlink | Resource |
|---|