CVE-2024-11079
Ansible-core: unsafe tagging bypass via hostvars object in ansible-core
CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th
A flaw was found in Ansible-Core. This vulnerability allows attackers to bypass unsafe content protections using the hostvars object to reference and execute templated content. This issue can lead to arbitrary code execution if remote data or module outputs are improperly templated within playbooks.
| CWE | CWE-20 |
| Published | Nov 11, 2024 |
| Last Updated | Mar 18, 2026 |
Stay Ahead of the Next One
Get instant alerts for
Be the first to know when new medium vulnerabilities are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low
Affected Versions
Red Hat / Ansible Automation Platform Execution Environments
All versions affected Red Hat / Ansible Automation Platform Execution Environments
All versions affected Red Hat / Ansible Automation Platform Execution Environments
All versions affected Red Hat / Ansible Automation Platform Execution Environments
All versions affected Red Hat / Ansible Automation Platform Execution Environments
All versions affected Red Hat / Red Hat Ansible Automation Platform 2.5 for RHEL 8
All versions affected Red Hat / Red Hat Ansible Automation Platform 2.5 for RHEL 9
All versions affected Red Hat / Red Hat Enterprise Linux 10
All versions affected Red Hat / Red Hat Enterprise Linux AI (RHEL AI)
All versions affected Red Hat / Red Hat Enterprise Linux AI (RHEL AI)
All versions affected References
access.redhat.com: https://access.redhat.com/errata/RHSA-2024:10770 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:11145 access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-11079 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2325171 lists.debian.org: https://lists.debian.org/debian-lts-announce/2026/03/msg00006.html