๐Ÿ” CVE Alert

CVE-2024-11079

MEDIUM 5.5

Ansible-core: unsafe tagging bypass via hostvars object in ansible-core

CVSS Score
5.5
EPSS Score
0.0%
EPSS Percentile
0th

A flaw was found in Ansible-Core. This vulnerability allows attackers to bypass unsafe content protections using the hostvars object to reference and execute templated content. This issue can lead to arbitrary code execution if remote data or module outputs are improperly templated within playbooks.

CWE CWE-20
Published Nov 11, 2024
Last Updated Mar 18, 2026
Stay Ahead of the Next One

Get instant alerts for

Be the first to know when new medium vulnerabilities are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:C/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
High
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
Low
Integrity
Low
Availability
Low

Affected Versions

Red Hat / Ansible Automation Platform Execution Environments
All versions affected
Red Hat / Ansible Automation Platform Execution Environments
All versions affected
Red Hat / Ansible Automation Platform Execution Environments
All versions affected
Red Hat / Ansible Automation Platform Execution Environments
All versions affected
Red Hat / Ansible Automation Platform Execution Environments
All versions affected
Red Hat / Red Hat Ansible Automation Platform 2.5 for RHEL 8
All versions affected
Red Hat / Red Hat Ansible Automation Platform 2.5 for RHEL 9
All versions affected
Red Hat / Red Hat Enterprise Linux 10
All versions affected
Red Hat / Red Hat Enterprise Linux AI (RHEL AI)
All versions affected
Red Hat / Red Hat Enterprise Linux AI (RHEL AI)
All versions affected

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
access.redhat.com: https://access.redhat.com/errata/RHSA-2024:10770 access.redhat.com: https://access.redhat.com/errata/RHSA-2024:11145 access.redhat.com: https://access.redhat.com/security/cve/CVE-2024-11079 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2325171 lists.debian.org: https://lists.debian.org/debian-lts-announce/2026/03/msg00006.html