First published: Fri Feb 28 2025(Updated: )
A flaw was found in aap-gateway. Concurrent requests handled by the gateway grpc service can result in "swapping" a request. Effectively, a lesser privileged user (even unauthenticated) can get the JWT of a greater privileged user
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Ansible AAP Gateway |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-1801 is classified as a high severity vulnerability due to the potential for unauthorized access to privileged user information.
To mitigate CVE-2025-1801, ensure you apply the latest patch or update provided for the Ansible aap-gateway software.
CVE-2025-1801 affects users of the Ansible aap-gateway, particularly those using it for managing concurrent requests.
The consequences of CVE-2025-1801 include potential privilege escalation, as lower privileged users may gain access to higher privileged users' JWT tokens.
CVE-2025-1801 was disclosed in 2025, highlighting a significant security flaw in handling requests within the Ansible aap-gateway.