The following advisory data is extracted from: https://security.access.redhat.com/data/csaf/v2/advisories/2025/rhsa-2025_2518.json Red Hat officially shut down their mailing list notifications October 10, 2023. Due to this, Packet Storm has recreated the below data as a reference point to raise awareness. It must be noted that due to an inability to easily track revision updates without crawling Red Hat's archive, these advisories are single notifications and we strongly suggest that you visit the Red Hat provided links to ensure you have the latest information available if the subject matter listed pertains to your environment. - Packet Storm Staff ==================================================================== Red Hat Security Advisory Synopsis: Moderate: Red Hat Ansible Automation Platform 2.5 Product Security and Bug Fix Update Advisory ID: RHSA-2025:2518-03 Product: Red Hat Ansible Automation Platform Advisory URL: https://access.redhat.com/errata/RHSA-2025:2518 Issue date: 2025-03-10 Revision: 03 CVE Names: ==================================================================== Summary: An update is now available for Red Hat Ansible Automation Platform 2.5 Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. Description: Red Hat Ansible Automation Platform provides an enterprise framework for building, deploying and managing IT automation at scale. IT Managers can provide top-down guidelines on how automation is applied to individual teams, while automation developers retain the freedom to write tasks that leverage existing knowledge without the overhead. Ansible Automation Platform makes it possible for users across an organization to share, vet, and manage automation content by means of a simple, powerful, and agentless language. Security Fix(es): * automation-gateway: Mutation XSS in DOMPurify Due to Improper Template Literal Handling (CVE-2025-26791) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. Updates and fixes included: Automation Platform * Fixed an issue that would prevent some types of resources from getting synced if there was a naming conflict (AAP-41241) * Fixed an issue where login would fail for users who were members of a team or organization that had a naming conflict (AAP-41240) * Fixed an issue in the user collection module where running with state: present would cause a stack trace (AAP-40887) * Fixed an issue preventing the controller admin password to get set for the gateway admin account during upgrades (AAP-40839) * Fixed an issue that caused updates to SAML authenticators to ignore an updated public certificate provided via UI or API and then fail with the message \"The certificate and private key do not match\" (AAP-40767) * Allow services to request cloud.redhat.com settings from gateway using ServiceTokenAuth (AAP-39649) * Fixed ServiceAuthToken destroy method to allow HTTP delete via ServiceAuth to work properly (AAP-37630) * automation-gateway has been updated to 2.5.20250312 * python3.11-django-ansible-base has been updated to 2.5.20250312 Automation controller * Fixed the indirect host counting name to not record the hostname, but from the query result instead (AAP-41033) * Fixed OpaClient to initialize properly after timeouts and retries (AAP-40997) * Added service account credentials for Analytics in controller (AAP-40769) * Added a helper method in the API for fetching the service account token from sso.redhat.com (AAP-39637) * automation-controller has been updated to 4.6.9 Event-Driven Ansible * Fixed ansible-rulebook support for third party python libraries (AAP-41341) * Modified the behavior of the ansible-rulebook and Event-Driven Ansible to help with issues when the activation correctly started was considered unresponsive and scheduled for restarting (AAP-41070) * Added support for editing and copying of rulebook activations in the API (AAP-40254) * Rulebook activations' log message field is separated into timestamps and message fields (AAP-39743) * Fixed a bug where the activation was incorrectly restarted with the error message \"Missing container for running activation\" (AAP-39545) * Event streams now connect to PostgreSQL by using the certificates configured at the installation (AAP-39294) * User is now required to give a user defined name when copying a credential. The new credential name must be unique (AAP-39079) * Enhanced error messages related to Decision Environments (AAP-38941) * Decision environment urls are now validated against OCI specification to ensure successful authentication to the container registry when pulling the image (AAP-38822) * ansible-rulebook has been updated to 1.1.3 * automation-eda-controller has been updated to 1.1.6 Receptor: * Fixed an issue where receptor was creating too many inotify processes, and where the user would encounter a too many open files error (AAP-22605) * receptor has been updated to 1.5.3 Container-based Ansible Automation Platform * Corrected the URL in the postinstall code for automation hub to use the gateway proxy URL (AAP-41306) * Deprecated the variables eda_main_url and hub_main_url in favor of the gateway proxy URL (AAP-41306) * Receptor mesh connections are now created between all automation controller nodes (AAP-41102) * Fixed receptor configuration related to the container group instances type (AAP-40431) * Fixed behavior that would hide the errors during EDA status validation (AAP-40021) * Ensure the polkit RPM package is installed in order to enable user lingering (AAP-39860) * containerized installer setup has been updated to 2.5-11 RPM-based Ansible Automation Platform * Fixed an issue where SELinux relabeling didn't happen when fcontext rules were changed (AAP-40489) * Fixed an issue where the credentials for execution environments and decision environments hosted in automation hub were incorrectly configured (AAP-40419) * Fixed an issue where projects failed to sync due to incorrectly configured credentials for ansible collections hosted in automation hub (AAP-40418) * Managed CA will now correctly assign eligible groups during discovery during installation, backup and restore (AAP-40277) * Implemented argument to collect sosreport using the setup script (AAP-40085) * EDA Activation logging is now provided via the journald driver (AAP-39745) * ansible-automation-platform-installer and installer setup have been updated to 2.5-9 Additional changes: * ansible-creator has been updated to 25.0.0 * ansible-dev-environment has been updated to 25.1.0 * ansible-dev-tools has been updated to 25.2.0 * ansible-lint has been updated to 25.1.2 * ansible-navigator has been updated to 25.1.0 * automation-hub has been updated to 4.10.2 * molecule has been updated to 25.2.0 * python3.11-ansible-compat has been updated to 25.1.2 * python3.11-galaxy-importer has been updated to 0.4.28 * python3.11-galaxy-ng has been updated to 4.10.2 * python3.11-jsonschema-path has been updated to 0.3.4 * python3.11-podman has been updated to 5.2.0 * python3.11-pytest-ansible has been updated to 25.1.0 * python3.11-referencing has been updated to 0.36.2 * python3.11-tox-ansible has been updated to 25.1.0 * python3.11-typing-extensions has been updated to 4.9.0 Solution: CVEs: References: https://access.redhat.com/security/updates/classification/#moderate https://bugzilla.redhat.com/show_bug.cgi?id=2345695 https://issues.redhat.com/browse/AAP-40489