Home

Description

A flaw was found in the Red Hat Ansible Automation Platform, Event-Driven Ansible (EDA) Event Streams. This vulnerability allows an authenticated user to gain access to sensitive internal infrastructure headers (such as X-Trusted-Proxy and X-Envoy-*) and event stream URLs via crafted requests and job templates. By exfiltrating these headers, an attacker could spoof trusted requests, escalate privileges, or perform malicious event injection.

PUBLISHED Reserved 2025-09-03 | Published 2026-02-27 | Updated 2026-02-28 | Assigner redhat




MEDIUM: 6.7CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Problem types

Exposure of Sensitive Information to an Unauthorized Actor

Product status

Default status
affected

0:3.1.1-1.el8ap (rpm) before *
unaffected

Default status
affected

0:25.12.0-1.el8ap (rpm) before *
unaffected

Default status
affected

0:25.12.2-1.1.el8ap (rpm) before *
unaffected

Default status
affected

0:25.12.0-1.el8ap (rpm) before *
unaffected

Default status
affected

0:25.12.0-1.el8ap (rpm) before *
unaffected

Default status
affected

0:25.12.0-1.el8ap (rpm) before *
unaffected

Default status
affected

0:0.1.4-1.el8ap (rpm) before *
unaffected

Default status
affected

0:1.1.14-1.el8ap (rpm) before *
unaffected

Default status
affected

0:4.10.10-1.el8ap (rpm) before *
unaffected

Default status
affected

0:2.13.0-1.el8ap (rpm) before *
unaffected

Default status
affected

0:25.12.0-1.el8ap (rpm) before *
unaffected

Default status
affected

0:25.12.0-1.el8ap (rpm) before *
unaffected

Default status
affected

0:0.4.0-1.el8ap (rpm) before *
unaffected

Default status
affected

0:4.2.26-1.el8ap (rpm) before *
unaffected

Default status
affected

0:2.1.2-1.el8ap (rpm) before *
unaffected

Default status
affected

0:0.4.36-2.el8ap (rpm) before *
unaffected

Default status
affected

0:4.10.10-1.el8ap (rpm) before *
unaffected

Default status
affected

0:23.0.0-1.el8ap (rpm) before *
unaffected

Default status
affected

0:1.6.0-1.el8ap (rpm) before *
unaffected

Default status
affected

0:9.0.1-1.el8ap (rpm) before *
unaffected

Default status
affected

0:25.12.0-1.el8ap (rpm) before *
unaffected

Default status
affected

0:3.8.0-1.el8ap (rpm) before *
unaffected

Default status
affected

0:0.2.15-1.el8ap (rpm) before *
unaffected

Default status
affected

0:0.4.2-1.el8ap (rpm) before *
unaffected

Default status
affected

0:25.12.0-1.2.el8ap (rpm) before *
unaffected

Default status
affected

0:4.15.0-1.el8ap (rpm) before *
unaffected

Default status
affected

0:3.1.1-1.el9ap (rpm) before *
unaffected

Default status
affected

0:25.12.0-1.el9ap (rpm) before *
unaffected

Default status
affected

0:25.12.2-1.1.el9ap (rpm) before *
unaffected

Default status
affected

0:25.12.0-1.el9ap (rpm) before *
unaffected

Default status
affected

0:25.12.0-1.el9ap (rpm) before *
unaffected

Default status
affected

0:25.12.0-1.el9ap (rpm) before *
unaffected

Default status
affected

0:0.1.4-1.el9ap (rpm) before *
unaffected

Default status
affected

0:1.1.14-1.el9ap (rpm) before *
unaffected

Default status
affected

0:4.10.10-1.el9ap (rpm) before *
unaffected

Default status
affected

0:2.13.0-1.el9ap (rpm) before *
unaffected

Default status
affected

0:25.12.0-1.el9ap (rpm) before *
unaffected

Default status
affected

0:25.12.0-1.el9ap (rpm) before *
unaffected

Default status
affected

0:0.4.0-1.el9ap (rpm) before *
unaffected

Default status
affected

0:4.2.26-1.el9ap (rpm) before *
unaffected

Default status
affected

0:2.1.2-1.el9ap (rpm) before *
unaffected

Default status
affected

0:0.4.36-2.el9ap (rpm) before *
unaffected

Default status
affected

0:4.10.10-1.el9ap (rpm) before *
unaffected

Default status
affected

0:23.0.0-1.el9ap (rpm) before *
unaffected

Default status
affected

0:1.6.0-1.el9ap (rpm) before *
unaffected

Default status
affected

0:9.0.1-1.el9ap (rpm) before *
unaffected

Default status
affected

0:25.12.0-1.el9ap (rpm) before *
unaffected

Default status
affected

0:3.8.0-1.el9ap (rpm) before *
unaffected

Default status
affected

0:0.2.15-1.el9ap (rpm) before *
unaffected

Default status
affected

0:0.4.2-1.el9ap (rpm) before *
unaffected

Default status
affected

0:25.12.0-1.2.el9ap (rpm) before *
unaffected

Default status
affected

0:4.15.0-1.el9ap (rpm) before *
unaffected

Default status
affected

0:1.2.1-1.el9ap (rpm) before *
unaffected

Default status
affected

sha256:07673470fb62db8bec12ec20b2500228c0c6d5108916dd936d91e10610b783d1 (rpm) before *
unaffected

Default status
affected

sha256:142125ce7f176ce4d9755f3124714bbfd8e10a687378988761d5451bd135ca76 (rpm) before *
unaffected

Timeline

2025-09-03:Reported to Red Hat.
2025-09-17:Made public.

Credits

This issue was discovered by Elijah DeLee (Red Hat).

References

access.redhat.com/errata/RHSA-2025:19201 (RHSA-2025:19201) vendor-advisory

access.redhat.com/errata/RHSA-2025:19221 (RHSA-2025:19221) vendor-advisory

access.redhat.com/errata/RHSA-2025:23069 (RHSA-2025:23069) vendor-advisory

access.redhat.com/errata/RHSA-2025:23131 (RHSA-2025:23131) vendor-advisory

access.redhat.com/security/cve/CVE-2025-9908 vdb-entry

bugzilla.redhat.com/show_bug.cgi?id=2392835 (RHBZ#2392835) issue-tracking

cve.org (CVE-2025-9908)

nvd.nist.gov (CVE-2025-9908)

Download JSON