AAP 2.6 IDP Auto-Link Email Matching Bypass Enables Hijack
CVE-2026-6266 Published on May 4, 2026
Aap-controller: aap-gateway: account hijacking and unauthorized access via unverified email linking
A flaw was found in the AAP gateway. The user auto-link strategy, introduced in AAP 2.6, automatically links an external Identity Provider (IDP) identity to an existing AAP user account based on email matching without verifying email ownership. This allows a remote attacker to potentially hijack a victim's account or gain unauthorized access to other accounts, including administrative accounts, by manipulating the IDP-provided email.
Vulnerability Analysis
CVE-2026-6266 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality and integrity, and a small impact on availability.
Timeline
Reported to Red Hat.
Made public. 20 days later.
Weakness Type
Authentication Bypass by Primary Weakness
The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.
Products Associated with CVE-2026-6266
Want to know whenever a new CVE is published for Red Hat products? stack.watch will email you.
Affected Versions
Red Hat Ansible Automation Platform 2.5 for RHEL 8:- Version 0:4.6.28-3.el8ap and below * is unaffected.
- Version 0:2.5.20260422-2.el8ap and below * is unaffected.
- Version 0:2.5.20260422-2.el8ap and below * is unaffected.
- Version 0:4.6.28-3.el9ap and below * is unaffected.
- Version 0:2.5.20260422-2.el9ap and below * is unaffected.
- Version 0:2.5.20260422-2.el9ap and below * is unaffected.
- Version 0:4.7.11-2.el9ap and below * is unaffected.
- Version 0:2.6.20260422-1.el9ap and below * is unaffected.
- Version 0:2.6.20260422-1.el9ap and below * is unaffected.
- Version 1777377014 and below * is unaffected.
- Version 1777311120 and below * is unaffected.