A flaw was found in the Red Hat Ansible Automation Platform Gateway route creation component. This vulnerability allows credential theft via the creation of misleading routes using a double-slash (//) prefix in the gateway_path. A malicious or socially engineered administrator can configure a honey-pot route to intercept and exfiltrate user credentials, potentially maintaining persistent access or creating a backdoor even after their permissions are revoked.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/errata/RHSA-2025:21768 | Vendor Advisory |
| https://access.redhat.com/errata/RHSA-2025:21775 | Vendor Advisory |
| https://access.redhat.com/errata/RHSA-2025:23069 | Vendor Advisory |
| https://access.redhat.com/errata/RHSA-2025:23131 | Vendor Advisory |
| https://access.redhat.com/security/cve/CVE-2025-9909 | Vendor Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2392836 | Issue Tracking Vendor Advisory |
Configurations
Configuration 1 (hide)
| AND |
|
History
No history.
Information
Published : 2026-02-27 08:17
Updated : 2026-03-25 20:18
NVD link : CVE-2025-9909
Mitre link : CVE-2025-9909
CVE.ORG link : CVE-2025-9909
JSON object : View
Products Affected
redhat
- ansible_automation_platform
- ansible_developer
- ansible_inside
- enterprise_linux
CWE
CWE-647
Use of Non-Canonical URL Paths for Authorization Decisions
