Synopsis
The remote Red Hat host is missing one or more security updates.
Description
The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2025:19201 advisory.
    Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing     IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to     individual teams, while automation developers retain the freedom to write tasks that leverage existing     knowledge without the overhead. Ansible Automation Platform makes it possible for users across an     organization to share, vet, and manage automation content by means of a simple, powerful, and agentless     language.
    Security Fix(es):
    * automation-platform-ui: tar-fs symlink validation bypass (CVE-2025-59343)
    * python3.11-django: Potential partial directory-traversal via archive.extract() (CVE-2025-59682)
    * automation-eda-controller: Sensitive Internal Headers Disclosure in AAP EDA Event Streams     (CVE-2025-9908)
    * automation-eda-controller: Event Stream Test Mode Exposes Sensitive Headers in AAP EDA (CVE-2025-9907)
    For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and     other related information, refer to the CVE page(s) listed in the References section.
    Updates and fixes included:
    Automation Platform
    * Fixes issue that prevents SAML and AzureAD authentication when local user accounts share the same email     address (AAP-56518)
    * Updated error handling in the Authenticator form to match other forms in the Platform UI (AAP-56356)
    * Update autocomplete settings (AAP-55783)
    * Added a step in the subscription wizard that allows the user to configure automation analytics     (AAP-55094)
    * Subscription credentials can no longer be viewed/edited from the system settings page (AAP-55014)
    * Fixed the permission list when creating a custom role and selecting the Automation Decisions project or     credential types (AAP-54756)
    * Fixed an issue where the settings did not display Red Hat consistently in the API and UI (AAP-54276)
    * Fixed an issue where the Load More in authentication mapping role dropdown did not work (AAP-54049)
    * Fixed an issue where the decision environment dropdown displayed an empty dropdown when there are no     decision environments available (AAP-53844)
    * Component label for Platform Auditor role was fixed to display all components (AAP-53551)
    * Topology layout and full screen mode were fixed (AAP-51106)
    * Empty strings are no longer displayed in the extra variables field on the Jobs > Details page     (AAP-49448)
    * Added two new toggle options on the subscription wizard to allow for fetching subscriptions using basic     authentication (AAP-47865)
    * Fixed default execution environment selection in the automation settings page (AAP-39321)
    * automation-gateway has been updated to 2.6.20251022
    * automation-gateway-proxy has been updated to 2.6.6-4
    * automation-platform-ui has been updated to 2.6.2
    * python3.11-django-ansible-base has been updated to 2.6.20251023
    Automation controller
    * The metrics endpoint no longer returns duplicate metrics(AAP-56148)
    * Fixed Platform Auditor to view controller settings (AAP-55607)
    * Added support for Red Hat username and password for the subscription management API (AAP-54975)
    * Fixed system_administrator role creation race condition (AAP-54963)
    * Improved stability on long-running jobs, clusters under heavy load and network flakiness in receptor     (AAP-53742)
    * Fixed an issue where the ansible.platform collection did not work with the default Red Hat Ansible     Automation Platform credential type (AAP-41000)
    * automation-controller has been updated to 4.7.4
    * receptor has been updated to 1.6.0
    Automation hub
    * Fixed an issue where _ui/v2/ user detail displayed the data incorrectly (AAP-54260)
    * automation-hub has been updated to 4.11.2
    * python3.11-galaxy-importer has been updated to 0.4.34
    * python3.11-galaxy-ng has been updated to 4.11.2
    Event-Driven Ansible
    * automation-eda-controller has been updated to 1.2.1
    Container-based Ansible Automation Platform
    * Fixed issue with the lightspeed containers configuration when running installation for the second time     over the existing AAP (AAP-56263)
    * Set REDHAT_CANDLEPIN_VERIFY to correct CA pem so that controller can make requests to     subscription.rhsm.redhat.com (AAP-55180)
    * Implemented ansible-core version validation (AAP-54932)
    * containerized installer setup has been updated to 2.6-2
    RPM-based Ansible Automation Platform
    * Fixed an issue where setting automationgateway_disable_https=false resulted in install failure     (AAP-55466)
    * Set REDHAT_CANDLEPIN_VERIFY to correct CA pem so that controller can make requests to     subscription.rhsm.redhat.com (AAP-55183)
    * Fixed an issue where RESOURCE_KEY SECRET_KEY was not updated when restoring from a different environment     (AAP-54942)
    * Fixed an issue where EDA DE credentials failed to populate on initial install (AAP-54519)
    * Fixed an issue where automation gateway's envoy.log did not receive logs after it was rotated     (AAP-51779)
    * ansible-automation-platform-installer and installer setup have been updated to 2.6-2
    Additional changes
    * Updated ansible-builder and ansible-navigator to use EE images from ansible-automation-platform-26     namespace by default (AAP-54934)
    * aap-metrics-utility has been updated to 0.6.1
    * ansible-builder has been updated to 3.1.0-2
    * ansible-navigator has been updated to 25.8.0-2
    * python3.11-daemon has been updated to 3.1.2
    * python3.11-django has been updated to 4.2.25
Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.
Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.
Solution
Update the affected packages.
Plugin Details
File Name: redhat-RHSA-2025-19201.nasl
Agent: unix
Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus
Risk Information
Vendor
Vendor Severity: Important
Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:N/A:N
Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C
Threat Vector: CVSS:4.0/E:U
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N
Vulnerability Information
CPE: p-cpe:/a:redhat:enterprise_linux:automation-eda-controller-worker-services, p-cpe:/a:redhat:enterprise_linux:python3.11-django, p-cpe:/a:redhat:enterprise_linux:automation-eda-controller-base, p-cpe:/a:redhat:enterprise_linux:automation-eda-controller-base-services, p-cpe:/a:redhat:enterprise_linux:automation-eda-controller-event-stream-services, p-cpe:/a:redhat:enterprise_linux:automation-platform-ui, cpe:/o:redhat:enterprise_linux:9, p-cpe:/a:redhat:enterprise_linux:automation-eda-controller
Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu
Exploit Ease: No known exploits are available
Patch Publication Date: 10/28/2025
Vulnerability Publication Date: 9/24/2025