A cross-site request forgery vulnerability was found in Jenkins Ansible Tower Plugin 0.9.1 and earlier in the TowerInstallation.TowerInstallationDescriptor#doTestTowerConnection form validation method allowed attackers permission to connect to an attacker-specified URL using attacker-specified credentials IDs obtained through another method, capturing credentials stored in Jenkins
Upstream Advisory: https://www.jenkins.io/security/advisory/2019-04-30/#SECURITY-1355
Not something we maintain or ship.
CloudForms 5.11 do not use ansible-tower and 5.10 only using ansible-tower-venv-ansible atm.
Tower is not shipping neither maintaining this plugin, that's part of jenkinsci but not ansible as such. Not any Ansible Tower versions are affected as such.