A flaw was found in the AAP MCP server. An unauthenticated remote attacker can exploit a log injection vulnerability by sending specially crafted input to the `toolsetroute` parameter. This parameter is not properly sanitized before being written to logs, allowing the attacker to inject control characters such as newlines and ANSI escape sequences. This enables the attacker to obscure legitimate log entries and insert forged ones, which could facilitate social engineering attacks, potentially leading to an operator executing dangerous commands or visiting malicious URLs.
History

Sat, 18 Apr 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 17 Apr 2026 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

threat_severity

Moderate


Fri, 17 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
Description A flaw was found in the AAP MCP server. An unauthenticated remote attacker can exploit a log injection vulnerability by sending specially crafted input to the `toolsetroute` parameter. This parameter is not properly sanitized before being written to logs, allowing the attacker to inject control characters such as newlines and ANSI escape sequences. This enables the attacker to obscure legitimate log entries and insert forged ones, which could facilitate social engineering attacks, potentially leading to an operator executing dangerous commands or visiting malicious URLs.
Title Aap-mcp-server: aap mcp server: log injection allows social engineering attacks via unsanitized input
First Time appeared Redhat
Redhat ansible Automation Platform
Weaknesses CWE-117
CPEs cpe:/a:redhat:ansible_automation_platform:2
Vendors & Products Redhat
Redhat ansible Automation Platform
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2026-04-18T02:53:52.696Z

Reserved: 2026-04-17T08:07:26.403Z

Link: CVE-2026-6494

cve-icon Vulnrichment

Updated: 2026-04-18T02:53:39.560Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-17T09:16:05.600

Modified: 2026-04-17T15:07:18.050

Link: CVE-2026-6494

cve-icon Redhat

Severity : Moderate

Publid Date: 2026-04-17T00:00:00Z

Links: CVE-2026-6494 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T20:40:14Z