A flaw was found in the AAP gateway. The user auto-link strategy, introduced in AAP 2.6, automatically links an external Identity Provider (IDP) identity to an existing AAP user account based on email matching without verifying email ownership. This allows a remote attacker to potentially hijack a victim's account or gain unauthorized access to other accounts, including administrative accounts, by manipulating the IDP-provided email.
History

Tue, 05 May 2026 00:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Important


Mon, 04 May 2026 21:30:00 +0000

Type Values Removed Values Added
References

Mon, 04 May 2026 21:00:00 +0000

Type Values Removed Values Added
CPEs cpe:/a:redhat:ansible_automation_platform:2.5::el8
cpe:/a:redhat:ansible_automation_platform:2.5::el9
cpe:/a:redhat:ansible_automation_platform_developer:2.5::el8
cpe:/a:redhat:ansible_automation_platform_developer:2.5::el9
cpe:/a:redhat:ansible_automation_platform_inside:2.5::el8
cpe:/a:redhat:ansible_automation_platform_inside:2.5::el9
References

Mon, 04 May 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 04 May 2026 14:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in the AAP gateway. The user auto-link strategy, introduced in AAP 2.6, automatically links an external Identity Provider (IDP) identity to an existing AAP user account based on email matching without verifying email ownership. This allows a remote attacker to potentially hijack a victim's account or gain unauthorized access to other accounts, including administrative accounts, by manipulating the IDP-provided email.
Title Aap-controller: aap-gateway: account hijacking and unauthorized access via unverified email linking
First Time appeared Redhat
Redhat ansible Automation Platform
Redhat ansible Automation Platform Developer
Redhat ansible Automation Platform Inside
Weaknesses CWE-305
CPEs cpe:/a:redhat:ansible_automation_platform:2.6::el10
cpe:/a:redhat:ansible_automation_platform:2.6::el9
cpe:/a:redhat:ansible_automation_platform_developer:2.6::el10
cpe:/a:redhat:ansible_automation_platform_developer:2.6::el9
cpe:/a:redhat:ansible_automation_platform_inside:2.6::el9
Vendors & Products Redhat
Redhat ansible Automation Platform
Redhat ansible Automation Platform Developer
Redhat ansible Automation Platform Inside
References
Metrics cvssV3_1

{'score': 8.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-05-04T20:56:54.266Z

Reserved: 2026-04-14T06:33:59.504Z

Link: CVE-2026-6266

cve-icon Vulnrichment

Updated: 2026-05-04T16:33:29.773Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-05-04T14:16:35.970

Modified: 2026-05-04T22:16:19.410

Link: CVE-2026-6266

cve-icon Redhat

Severity : Important

Publid Date: 2026-05-04T13:35:24Z

Links: CVE-2026-6266 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T16:00:04Z