RHEL 9 : Red Hat Ansible Automation Platform 2.6 Product Security and Bug Fix Update (Important) (RHSA-2025:19201)

high Nessus Plugin ID 271928

Synopsis

The remote Red Hat host is missing one or more security updates.

Description

The remote Redhat Enterprise Linux 9 host has packages installed that are affected by multiple vulnerabilities as referenced in the RHSA-2025:19201 advisory.

Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language.

Security Fix(es):

* automation-platform-ui: tar-fs symlink validation bypass (CVE-2025-59343)
* python3.11-django: Potential partial directory-traversal via archive.extract() (CVE-2025-59682)
* automation-eda-controller: Sensitive Internal Headers Disclosure in AAP EDA Event Streams (CVE-2025-9908)
* automation-eda-controller: Event Stream Test Mode Exposes Sensitive Headers in AAP EDA (CVE-2025-9907)

For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.

Updates and fixes included:

Automation Platform
* Fixes issue that prevents SAML and AzureAD authentication when local user accounts share the same email address (AAP-56518)
* Updated error handling in the Authenticator form to match other forms in the Platform UI (AAP-56356)
* Update autocomplete settings (AAP-55783)
* Added a step in the subscription wizard that allows the user to configure automation analytics (AAP-55094)
* Subscription credentials can no longer be viewed/edited from the system settings page (AAP-55014)
* Fixed the permission list when creating a custom role and selecting the Automation Decisions project or credential types (AAP-54756)
* Fixed an issue where the settings did not display Red Hat consistently in the API and UI (AAP-54276)
* Fixed an issue where the Load More in authentication mapping role dropdown did not work (AAP-54049)
* Fixed an issue where the decision environment dropdown displayed an empty dropdown when there are no decision environments available (AAP-53844)
* Component label for Platform Auditor role was fixed to display all components (AAP-53551)
* Topology layout and full screen mode were fixed (AAP-51106)
* Empty strings are no longer displayed in the extra variables field on the Jobs > Details page (AAP-49448)
* Added two new toggle options on the subscription wizard to allow for fetching subscriptions using basic authentication (AAP-47865)
* Fixed default execution environment selection in the automation settings page (AAP-39321)
* automation-gateway has been updated to 2.6.20251022
* automation-gateway-proxy has been updated to 2.6.6-4
* automation-platform-ui has been updated to 2.6.2
* python3.11-django-ansible-base has been updated to 2.6.20251023

Automation controller
* The metrics endpoint no longer returns duplicate metrics(AAP-56148)
* Fixed Platform Auditor to view controller settings (AAP-55607)
* Added support for Red Hat username and password for the subscription management API (AAP-54975)
* Fixed system_administrator role creation race condition (AAP-54963)
* Improved stability on long-running jobs, clusters under heavy load and network flakiness in receptor (AAP-53742)
* Fixed an issue where the ansible.platform collection did not work with the default Red Hat Ansible Automation Platform credential type (AAP-41000)
* automation-controller has been updated to 4.7.4
* receptor has been updated to 1.6.0

Automation hub
* Fixed an issue where _ui/v2/ user detail displayed the data incorrectly (AAP-54260)
* automation-hub has been updated to 4.11.2
* python3.11-galaxy-importer has been updated to 0.4.34
* python3.11-galaxy-ng has been updated to 4.11.2

Event-Driven Ansible
* automation-eda-controller has been updated to 1.2.1

Container-based Ansible Automation Platform
* Fixed issue with the lightspeed containers configuration when running installation for the second time over the existing AAP (AAP-56263)
* Set REDHAT_CANDLEPIN_VERIFY to correct CA pem so that controller can make requests to subscription.rhsm.redhat.com (AAP-55180)
* Implemented ansible-core version validation (AAP-54932)
* containerized installer setup has been updated to 2.6-2

RPM-based Ansible Automation Platform
* Fixed an issue where setting automationgateway_disable_https=false resulted in install failure (AAP-55466)
* Set REDHAT_CANDLEPIN_VERIFY to correct CA pem so that controller can make requests to subscription.rhsm.redhat.com (AAP-55183)
* Fixed an issue where RESOURCE_KEY SECRET_KEY was not updated when restoring from a different environment (AAP-54942)
* Fixed an issue where EDA DE credentials failed to populate on initial install (AAP-54519)
* Fixed an issue where automation gateway's envoy.log did not receive logs after it was rotated (AAP-51779)
* ansible-automation-platform-installer and installer setup have been updated to 2.6-2

Additional changes
* Updated ansible-builder and ansible-navigator to use EE images from ansible-automation-platform-26 namespace by default (AAP-54934)
* aap-metrics-utility has been updated to 0.6.1
* ansible-builder has been updated to 3.1.0-2
* ansible-navigator has been updated to 25.8.0-2
* python3.11-daemon has been updated to 3.1.2
* python3.11-django has been updated to 4.2.25

Tenable has extracted the preceding description block directly from the Red Hat Enterprise Linux security advisory.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Update the affected packages.

See Also

https://access.redhat.com/security/updates/classification/#important

https://bugzilla.redhat.com/show_bug.cgi?id=2392834

https://bugzilla.redhat.com/show_bug.cgi?id=2392835

https://bugzilla.redhat.com/show_bug.cgi?id=2397901

https://bugzilla.redhat.com/show_bug.cgi?id=2400450

https://issues.redhat.com/browse/AAP-49448

http://www.nessus.org/u?0b046724

https://access.redhat.com/errata/RHSA-2025:19201

Plugin Details

Severity: High

ID: 271928

File Name: redhat-RHSA-2025-19201.nasl

Version: 1.1

Type: local

Agent: unix

Published: 10/28/2025

Updated: 10/28/2025

Supported Sensors: Frictionless Assessment AWS, Frictionless Assessment Azure, Frictionless Assessment Agent, Nessus Agent, Agentless Assessment, Continuous Assessment, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

Vendor

Vendor Severity: Important

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:L/Au:S/C:C/I:N/A:N

CVSS Score Source: CVE-2025-59682

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

CVSS v4

Risk Factor: High

Base Score: 8.7

Threat Score: 6.6

Threat Vector: CVSS:4.0/E:U

Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N

CVSS Score Source: CVE-2025-59343

Vulnerability Information

CPE: p-cpe:/a:redhat:enterprise_linux:automation-eda-controller-worker-services, p-cpe:/a:redhat:enterprise_linux:python3.11-django, p-cpe:/a:redhat:enterprise_linux:automation-eda-controller-base, p-cpe:/a:redhat:enterprise_linux:automation-eda-controller-base-services, p-cpe:/a:redhat:enterprise_linux:automation-eda-controller-event-stream-services, p-cpe:/a:redhat:enterprise_linux:automation-platform-ui, cpe:/o:redhat:enterprise_linux:9, p-cpe:/a:redhat:enterprise_linux:automation-eda-controller

Required KB Items: Host/local_checks_enabled, Host/RedHat/release, Host/RedHat/rpm-list, Host/cpu

Exploit Ease: No known exploits are available

Patch Publication Date: 10/28/2025

Vulnerability Publication Date: 9/24/2025

Reference Information

CVE: CVE-2025-59343, CVE-2025-59682, CVE-2025-9907, CVE-2025-9908

CWE: 200, 22, 61

RHSA: 2025:19201