A flaw was found in the AAP MCP server. An unauthenticated remote attacker can exploit a log injection vulnerability by sending specially crafted input to the `toolsetroute` parameter. This parameter is not properly sanitized before being written to logs, allowing the attacker to inject control characters such as newlines and ANSI escape sequences. This enables the attacker to obscure legitimate log entries and insert forged ones, which could facilitate social engineering attacks, potentially leading to an operator executing dangerous commands or visiting malicious URLs.

Project Subscriptions

Vendors Products
Ansible Automation Platform Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 17 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 17 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in the AAP MCP server. An unauthenticated remote attacker can exploit a log injection vulnerability by sending specially crafted input to the `toolsetroute` parameter. This parameter is not properly sanitized before being written to logs, allowing the attacker to inject control characters such as newlines and ANSI escape sequences. This enables the attacker to obscure legitimate log entries and insert forged ones, which could facilitate social engineering attacks, potentially leading to an operator executing dangerous commands or visiting malicious URLs.
Title Aap-mcp-server: aap mcp server: log injection allows social engineering attacks via unsanitized input
First Time appeared Redhat
Redhat ansible Automation Platform
Weaknesses CWE-117
CPEs cpe:/a:redhat:ansible_automation_platform:2
Vendors & Products Redhat
Redhat ansible Automation Platform
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-17T08:18:50.757Z

Reserved: 2026-04-17T08:07:26.403Z

Link: CVE-2026-6494

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-17T09:16:05.600

Modified: 2026-04-17T15:07:18.050

Link: CVE-2026-6494

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-17T00:00:00Z

Links: CVE-2026-6494 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T11:00:13Z

Weaknesses