A flaw was found in the AAP MCP server. An unauthenticated remote attacker can exploit a log injection vulnerability by sending specially crafted input to the `toolsetroute` parameter. This parameter is not properly sanitized before being written to logs, allowing the attacker to inject control characters such as newlines and ANSI escape sequences. This enables the attacker to obscure legitimate log entries and insert forged ones, which could facilitate social engineering attacks, potentially leading to an operator executing dangerous commands or visiting malicious URLs.
History

Fri, 17 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in the AAP MCP server. An unauthenticated remote attacker can exploit a log injection vulnerability by sending specially crafted input to the `toolsetroute` parameter. This parameter is not properly sanitized before being written to logs, allowing the attacker to inject control characters such as newlines and ANSI escape sequences. This enables the attacker to obscure legitimate log entries and insert forged ones, which could facilitate social engineering attacks, potentially leading to an operator executing dangerous commands or visiting malicious URLs.
Title Aap-mcp-server: aap mcp server: log injection allows social engineering attacks via unsanitized input
First Time appeared Redhat
Redhat ansible Automation Platform
Weaknesses CWE-117
CPEs cpe:/a:redhat:ansible_automation_platform:2
Vendors & Products Redhat
Redhat ansible Automation Platform
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-17T08:18:50.757Z

Reserved: 2026-04-17T08:07:26.403Z

Link: CVE-2026-6494

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-17T09:16:05.600

Modified: 2026-04-17T09:16:05.600

Link: CVE-2026-6494

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.