VYPR
Medium severity5.3NVD Advisory· Published Aug 4, 2025· Updated Apr 15, 2026

CVE-2025-5988

CVE-2025-5988

Description

A flaw was found in the Ansible aap-gateway. Cross-site request forgery (CSRF) origin checking is not done on requests from the gateway to external components, such as the controller, hub, and eda.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing CSRF origin checks in aap-gateway can let an attacker send forged requests to external components like controller, hub, and eda.

Vulnerability

Overview

A flaw was found in the Ansible Automation Platform Gateway (aap-gateway) where cross-site request forgery (CSRF) origin checking is not performed on requests from the gateway to external components such as the controller, hub, and eda [1][3]. This means that the gateway does not validate the Origin header in requests forwarded to these external services, leaving them open to potential CSRF attacks [3].

Exploitation

Prerequisites

For exploitation, TLS edge termination must be configured prior to a request being passed into the gateway, as referer checking is used in place of origin checking for HTTPS requests [3]. Additionally, an attacker would need to obtain a valid CSRF form token associated with the victim's CSRF cookie [3]. This could be accomplished by making a cross-origin request to the platform via JavaScript while using the victim's cookies (though modern browsers typically block such requests) or by finding another means to derive the token [3]. Despite these requirements, the missing check increases the attack surface for cross-origin request forgery.

Impact

An attacker who successfully crafts a CSRF attack could perform actions on external components (controller, hub, eda) on behalf of an authenticated user without their knowledge. This could lead to unauthorized changes to automation configurations, credentials, or other sensitive operations managed by those components.

Mitigation

Red Hat has released an advisory (RHSA-2025:12772) as part of Ansible Automation Platform 2.5, which includes updates that address this vulnerability [1][2]. Users are advised to apply the update as soon as possible. No workarounds are mentioned in the available references.

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.