{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-14025","assignerOrgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","state":"PUBLISHED","assignerShortName":"redhat","dateReserved":"2025-12-04T12:33:19.376Z","datePublished":"2026-01-08T13:44:04.764Z","dateUpdated":"2026-02-26T15:04:54.734Z"},"containers":{"cna":{"title":"Ansible-automation-platform/aap-gateway: aap-gateway: read-only personal access token (pat) bypasses write restrictions","metrics":[{"other":{"content":{"value":"Important","namespace":"https://access.redhat.com/security/updates/classification/"},"type":"Red Hat severity rating"}},{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":8.5,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H","version":"3.1"},"format":"CVSS"}],"descriptions":[{"lang":"en","value":"A flaw was found in Ansible Automation Platform (AAP). Read-only scoped OAuth2 API Tokens in AAP, are enforced at the Gateway level for Gateway-specific operations. However, this vulnerability allows read-only tokens to perform write operations on backend services (e.g., Controller, Hub, EDA). If this flaw were exploited, an attacker‘s capabilities would only be limited by role based access controls (RBAC)."}],"affected":[{"vendor":"Red Hat","product":"Red Hat Ansible Automation Platform 2.5 for RHEL 8","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"automation-gateway","defaultStatus":"affected","versions":[{"version":"0:2.5.20260106-1.el8ap","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:ansible_automation_platform:2.5::el8","cpe:/a:redhat:ansible_automation_platform:2.5::el9"]},{"vendor":"Red Hat","product":"Red Hat Ansible Automation Platform 2.5 for RHEL 9","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"automation-gateway","defaultStatus":"affected","versions":[{"version":"0:2.5.20260106-1.el9ap","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:ansible_automation_platform:2.5::el8","cpe:/a:redhat:ansible_automation_platform:2.5::el9"]},{"vendor":"Red Hat","product":"Red Hat Ansible Automation Platform 2.6 for RHEL 9","collectionURL":"https://access.redhat.com/downloads/content/package-browser/","packageName":"automation-gateway","defaultStatus":"affected","versions":[{"version":"0:2.6.20260106-1.el9ap","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:ansible_automation_platform:2.6::el9"]},{"vendor":"Red Hat","product":"Red Hat Ansible Automation Platform 2.5","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"ansible-automation-platform-25/gateway-rhel8","defaultStatus":"affected","versions":[{"version":"sha256:2df290b61d7aac08deec2973d0a9b98788f6b619e974af0b3f4b61c759c7e464","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:ansible_automation_platform:2.5::el8"]},{"vendor":"Red Hat","product":"Red Hat Ansible Automation Platform 2.6","collectionURL":"https://catalog.redhat.com/software/containers/","packageName":"ansible-automation-platform-26/gateway-rhel9","defaultStatus":"affected","versions":[{"version":"sha256:766c7570afc4e9b163a3256a0d7c699327905c1d24213229acb0b96a9e65b615","lessThan":"*","versionType":"rpm","status":"unaffected"}],"cpes":["cpe:/a:redhat:ansible_automation_platform:2.6::el9"]}],"references":[{"url":"https://access.redhat.com/articles/7136004"},{"url":"https://access.redhat.com/errata/RHSA-2026:0360","name":"RHSA-2026:0360","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2026:0361","name":"RHSA-2026:0361","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2026:0408","name":"RHSA-2026:0408","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/errata/RHSA-2026:0409","name":"RHSA-2026:0409","tags":["vendor-advisory","x_refsource_REDHAT"]},{"url":"https://access.redhat.com/security/cve/CVE-2025-14025","tags":["vdb-entry","x_refsource_REDHAT"]},{"url":"https://bugzilla.redhat.com/show_bug.cgi?id=2418785","name":"RHBZ#2418785","tags":["issue-tracking","x_refsource_REDHAT"]}],"datePublic":"2025-12-04T10:10:00.000Z","problemTypes":[{"descriptions":[{"cweId":"CWE-279","description":"Incorrect Execution-Assigned Permissions","lang":"en","type":"CWE"}]}],"x_redhatCweChain":"CWE-279: Incorrect Execution-Assigned Permissions","workarounds":[{"lang":"en","value":"Defense-in-depth practices such as using RBAC to enforce the principle of least privilege and careful token management are essential to reduce the scope of impact. See this KCS article for additional details and strategies. https://access.redhat.com/articles/7136004"}],"timeline":[{"lang":"en","time":"2025-12-04T12:28:51.092Z","value":"Reported to Red Hat."},{"lang":"en","time":"2025-12-04T10:10:00.000Z","value":"Made public."}],"providerMetadata":{"orgId":"53f830b8-0a3f-465b-8143-3b8a9948e749","shortName":"redhat","dateUpdated":"2026-01-08T22:31:32.818Z"},"x_generator":{"engine":"cvelib 1.8.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2025-14025","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2026-01-09T04:55:21.012638Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T15:04:54.734Z"}}]}}