Description
A flaw was found in the AAP MCP server. An unauthenticated remote attacker can exploit a log injection vulnerability by sending specially crafted input to the `toolsetroute` parameter. This parameter is not properly sanitized before being written to logs, allowing the attacker to inject control characters such as newlines and ANSI escape sequences. This enables the attacker to obscure legitimate log entries and insert forged ones, which could facilitate social engineering attacks, potentially leading to an operator executing dangerous commands or visiting malicious URLs.
Published: 2026-04-17
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Log Injection Social Engineering
Action: Apply Patch
AI Analysis

Impact

A flaw in the AAP MCP Server allows an unauthenticated remote attacker to send crafted input to a specific parameter that is logged without proper sanitization. This log injection can insert newlines and ANSI escape sequences, obscuring legitimate log entries and inserting forged ones. The resulting confusion can lead an operator to execute inappropriate commands or follow malicious URLs, effectively enabling social engineering attacks. The weakness corresponds to improper output handling (CWE‑117).

Affected Systems

Red Hat Ansible Automation Platform 2 is affected; no specific version numbers were provided.

Risk and Exploitability

The vulnerability has a CVSS score of 5.3, indicating moderate severity. No EPSS score is available, and it is not listed in the CISA KEV catalog. The attack requires no authentication and relies solely on sending malicious input to the toolsetroute parameter from a remote host, making the risk moderate but realistic. Current public exploitation evidence is lacking, but the potential for social engineering through log manipulation warrants timely remediation.

Generated by OpenCVE AI on April 17, 2026 at 10:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Red Hat Ansible Automation Platform to the latest version that includes the log‑sanitization fix.
  • Implement input validation to strip or escape control characters before logging the toolsetroute parameter, or disable logging of that parameter if possible.
  • Continuously monitor application logs for unexpected control characters or inserted entries that may indicate an active log‑injection attempt.

Generated by OpenCVE AI on April 17, 2026 at 10:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 17 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 17 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in the AAP MCP server. An unauthenticated remote attacker can exploit a log injection vulnerability by sending specially crafted input to the `toolsetroute` parameter. This parameter is not properly sanitized before being written to logs, allowing the attacker to inject control characters such as newlines and ANSI escape sequences. This enables the attacker to obscure legitimate log entries and insert forged ones, which could facilitate social engineering attacks, potentially leading to an operator executing dangerous commands or visiting malicious URLs.
Title Aap-mcp-server: aap mcp server: log injection allows social engineering attacks via unsanitized input
First Time appeared Redhat
Redhat ansible Automation Platform
Weaknesses CWE-117
CPEs cpe:/a:redhat:ansible_automation_platform:2
Vendors & Products Redhat
Redhat ansible Automation Platform
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Redhat Ansible Automation Platform
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-17T08:18:50.757Z

Reserved: 2026-04-17T08:07:26.403Z

Link: CVE-2026-6494

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-17T09:16:05.600

Modified: 2026-04-17T15:07:18.050

Link: CVE-2026-6494

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-17T00:00:00Z

Links: CVE-2026-6494 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T20:40:14Z

Weaknesses