- Description
- A flaw was found in Ansible Automation Platform’s EDA component where user-supplied Git URLs are passed unsanitized to the git ls-remote command. This vulnerability allows an authenticated attacker to inject arguments and execute arbitrary commands on the EDA worker. In Kubernetes/OpenShift environments, this can lead to service account token theft and cluster access.
- Source
- secalert@redhat.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Secondary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- secalert@redhat.com
- CWE-88
- Hype score
- Not currently trending
[CVE-2025-49520: HIGH] Flaw in Ansible Automation Platform's EDA component allows authenticated attackers to execute arbitrary commands on the worker, leading to service account token theft in Kubernetes/Ope...#cve,CVE-2025-49520,#cybersecurity https://t.co/cin4nlZ5GI https://t.c
@CveFindCom
30 Jun 2025
71 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-49520 A flaw was found in Ansible Automation Platform’s EDA component where user-supplied Git URLs are passed unsanitized to the git ls-remote command. This vulnerability a… https://t.co/wB6agNUv1u
@CVEnew
30 Jun 2025
545 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes