PT-2026-36806 · Red Hat · Ansible Automation Platform Gateway
Robin Bobbitt
·
Published
2026-05-04
·
Updated
2026-05-04
·
CVE-2026-6266
CVSS v3.1
8.3
High
| Vector | AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L |
Name of the Vulnerable Software and Affected Versions
Ansible Automation Platform Gateway versions 2.6 and later
Description
A flaw in the AAP gateway involves the user auto-link strategy, which automatically links an external Identity Provider (IDP) identity to an existing user account based on email matching. Because the system does not verify email ownership, a remote attacker can manipulate the IDP-provided email to hijack a victim's account or gain unauthorized access to other accounts, including those with administrative privileges.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Ansible Automation Platform Gateway