CVE-2026-6494 PUBLISHED

Aap-mcp-server: aap mcp server: log injection allows social engineering attacks via unsanitized input

Assigner: redhat
Reserved: 17.04.2026 Published: 17.04.2026 Updated: 17.04.2026

A flaw was found in the AAP MCP server. An unauthenticated remote attacker can exploit a log injection vulnerability by sending specially crafted input to the toolsetroute parameter. This parameter is not properly sanitized before being written to logs, allowing the attacker to inject control characters such as newlines and ANSI escape sequences. This enables the attacker to obscure legitimate log entries and insert forged ones, which could facilitate social engineering attacks, potentially leading to an operator executing dangerous commands or visiting malicious URLs.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS Score: 5.3

Product Status

Vendor Red Hat
Product Red Hat Ansible Automation Platform 2
Versions Default: affected

Credits

  • This issue was discovered by Melissa Ing, Oleg Sushchenko, Jon Weiser (Red Hat).

References

Problem Types

  • Improper Output Neutralization for Logs CWE