CVE-2025-7738
Python3.11-django-ansible-base: sensitive authenticator secrets returned in clear text via api in aap
CVSS Score
4.4
EPSS Score
0.0%
EPSS Percentile
0th
A flaw was found in Ansible Automation Platform (AAP) where the Gateway API returns the client secret for certain GitHub Enterprise authenticators in clear text. This vulnerability affects administrators or auditors accessing authenticator configurations. While access is limited to privileged users, the clear text exposure of sensitive credentials increases the risk of accidental leaks or misuse.
| CWE | CWE-312 |
| Vendor | ansible |
| Product | django-ansible-base |
| Ecosystems | |
| Industries | Technology |
| Published | Jul 31, 2025 |
| Last Updated | Dec 23, 2025 |
Stay Ahead of the Next One
Get instant alerts for ansible django-ansible-base
Be the first to know when new medium vulnerabilities affecting ansible django-ansible-base are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N Attack Vector
Network
Attack Complexity
High
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Affected Versions
Ansible / django-ansible-base
0 < 2025.7.22
Red Hat / Red Hat Ansible Automation Platform 2.5 for RHEL 8
All versions affected Red Hat / Red Hat Ansible Automation Platform 2.5 for RHEL 9
All versions affected References
access.redhat.com: https://access.redhat.com/errata/RHSA-2025:12772 access.redhat.com: https://access.redhat.com/security/cve/CVE-2025-7738 bugzilla.redhat.com: https://bugzilla.redhat.com/show_bug.cgi?id=2381589 github.com: https://github.com/ansible/django-ansible-base/commit/e241ea4dce8df577eda15301e0a8e61be647b27b github.com: https://github.com/ansible/django-ansible-base/pull/773
Credits
Red Hat would like to thank Peter Braun (RedHat) for reporting this issue.