We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-49521

Event-driven-ansible: template injection via git branch and refspec in eda projects



Description

A flaw was found in the EDA component of the Ansible Automation Platform, where user-supplied Git branch or refspec values are evaluated as Jinja2 templates. This vulnerability allows authenticated users to inject expressions that execute commands or access sensitive files on the EDA worker. In OpenShift, it can lead to service account token theft.

Reserved 2025-06-06 | Published 2025-06-30 | Updated 2025-07-01 | Assigner redhat


HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

Improper Control of Generation of Code ('Code Injection')

Product status

Default status
affected

0:1.1.11-1.el8ap before *
unaffected

Default status
affected

0:1.1.11-1.el9ap before *
unaffected

Timeline

2025-06-06:Reported to Red Hat.
2025-06-30:Made public.

References

access.redhat.com/errata/RHSA-2025:9986 (RHSA-2025:9986) vendor-advisory

access.redhat.com/security/cve/CVE-2025-49521 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2370817 (RHBZ#2370817) issue-tracking

cve.org (CVE-2025-49521)

nvd.nist.gov (CVE-2025-49521)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-49521

Support options

Helpdesk Chat, Email, Knowledgebase