Authenticated Argument Injection vulnerability in the Git handling logic of the Ansible Automation Platform’s Event-Driven Ansible (EDA) component. The flaw occurs during EDA project creation, where the user-supplied Git repository URL is passed unvalidated to the git ls-remote command. By injecting malicious Git options, an attacker can execute arbitrary commands on the EDA worker. In Kubernetes or OpenShift environments, this enables attackers to exfiltrate the service account token of the pod, potentially granting access to secrets, pods, and other sensitive resources. The issue requires authenticated access but can be exploited remotely, without user interaction, leading to full system compromise.
This issue has been addressed in the following products: Red Hat Ansible Automation Platform 2.5 for RHEL 8 Red Hat Ansible Automation Platform 2.5 for RHEL 9 Via RHSA-2025:9986 https://access.redhat.com/errata/RHSA-2025:9986