Impact
A flaw in the AAP MCP Server allows an unauthenticated remote attacker to send crafted input to a specific parameter that is logged without proper sanitization. This log injection can insert newlines and ANSI escape sequences, obscuring legitimate log entries and inserting forged ones. The resulting confusion can lead an operator to execute inappropriate commands or follow malicious URLs, effectively enabling social engineering attacks. The weakness corresponds to improper output handling (CWE‑117).
Affected Systems
Red Hat Ansible Automation Platform 2 is affected; no specific version numbers were provided.
Risk and Exploitability
The vulnerability has a CVSS score of 5.3, indicating moderate severity. No EPSS score is available, and it is not listed in the CISA KEV catalog. The attack requires no authentication and relies solely on sending malicious input to the toolsetroute parameter from a remote host, making the risk moderate but realistic. Current public exploitation evidence is lacking, but the potential for social engineering through log manipulation warrants timely remediation.
OpenCVE Enrichment