Ansible Automation Platform patch release May 4, 2026
The following release notes detail the updates for the Ansible Automation Platform patch released on May 4, 2026
This release includes the following components and versions:
| Release Date | Component versions |
|---|---|
| May 4, 2026 |
|
CSV Versions in this release:
- Namespace-scoped bundle: aap-operator.v2.6.0-0.1777410689
- Cluster-scoped bundle: aap-operator.v2.6.0-0.1777410680
Overview Copy linkLink copied!
This Ansible Automation Platform 2.6 async (20260422) release includes a set of targeted enhancements across installation and platform UX, plus a large batch of security (CVE) remediations and bug fixes across multiple AAP components.
Enhancements Copy linkLink copied!
Automation hub Copy linkLink copied!
- Added verification that Hub supports Execution Environments with PQC signatures.(AAP-71606)
Container-based installer Ansible Automation Platform Copy linkLink copied!
- Fixed the preflight check to allow hop nodes to run on systems with less than 16GB of RAM.(AAP-71341)
Red Hat Ansible Lightspeed Copy linkLink copied!
- Support for llama-stack 0.4.3.(AAP-69996)
- Support for llama-stack 0.4.3.(AAP-65012)
Ansible Automation Platform Operator Copy linkLink copied!
- Allows the ability to disable backup db compression per component using the use_db_compression parameter (default: true). (AAP-69747)
Ansible Automation Platform ui Copy linkLink copied!
- Private flags only appear in UI when enabled - this applies uniformly to both runtime and install-time private flags. Private runtime flags can be toggled off via the UI, which causes them to disappear. This prevents users from easily discovering feature flags that are not meant to be advertised to all customers.(AAP-69669)
- Added a Feature Flags page under Settings that allows platform administrators to view feature flags and toggle runtime flags on or off without restarting services.(AAP-69001)
Automation controller Copy linkLink copied!
- Sets
XDG_CONFIG_HOME=/tmp/.configin theContainerfileso podman-remote can write its config at runtime. - Fixes
handle_removed_imagetask failing withRuntimeError: Error running command in containerized installer deployments. (AAP-68260)
Deprecated Copy linkLink copied!
Ansible Automation Platform Operator Copy linkLink copied!
old_postgres_configuration_secrethas been deprecated for automation controller and event-driven ansible.postgres_migrant_configuration_secrethas been deprecated for automation hub.(AAP-68604)
Receptor Copy linkLink copied!
- Address CVE-2025-68121.(AAP-65759)
CVE Copy linkLink copied!
General Copy linkLink copied!
- CVE-2026-6266: Account hijacking and unauthorized access via unverified email linking. This affects the following components:
automation-controllerfor {PlatformNameShort} 2.5 and 2.6.automation-gatewayfor {PlatformNameShort} 2.5 and 2.6.python3.12-django-ansible-basefor {PlatformNameShort} 2.5 and 2.6.ansible-automation-platform-26/controller-rhel9for Ansible Automation Platform 2.6 only.ansible-automation-platform-26/gateway-rhel9for Ansible Automation Platform 2.6 only.
Execution Environment Copy linkLink copied!
- CVE-2026-23490 - pyasn1: Denial of Service due to memory exhaustion from malformed RELATIVE-OID in:
ansible-automation-platform-26/ee-supported-rhel9for Ansible Automation Platform 2.6. AAP-72593
- CVE-2026-27459 - pyOpenSSL: DTLS cookie callback buffer overflow in:
- ansible-automation-platform-26/ee-supported-rhel9 for Ansible Automation Platform 2.6. AAP-68956
- CVE-2026-32274 - Black: Arbitrary file writes from unsanitized user input in cache file name in:
ansible-automation-platform-26/ee-minimal-rhel9for Ansible Automation Platform 2.6. AAP-68419
- CVE-2026-32597 - PyJWT accepts unknown crit header extensions (RFC 7515 §4.1.11 MUST violation) in:
- ansible-automation-platform-26/ee-supported-rhel9 for Ansible Automation Platform 2.6. AAP-68399
Automation controller Copy linkLink copied!
- CVE-2025-14550 - Django: Denial of Service via crafted request with duplicate headers in:
- automation-controller for Ansible Automation Platform 2.6. AAP-64818
- CVE-2025-69534 - markdown: Denial of Service via malformed HTML-like sequences in:
- automation-controller for Ansible Automation Platform 2.6. AAP-67446
- CVE-2026-26007 - cryptography: Subgroup Attack due to missing subgroup validation for SECT curves in:
- automation-controller for Ansible Automation Platform 2.6. AAP-65413
- CVE-2026-27459 - pyOpenSSL: DTLS cookie callback buffer overflow in:
- automation-controller for Ansible Automation Platform 2.6. AAP-68960
- CVE-2026-32597 - PyJWT accepts unknown crit header extensions (RFC 7515 §4.1.11 MUST violation) in:
- automation-controller for Ansible Automation Platform 2.6. AAP-68405
Automation hub Copy linkLink copied!
- CVE-2026-27459 - pyOpenSSL: DTLS cookie callback buffer overflow in:
- ansible-automation-platform-26/hub-rhel9 for Ansible Automation Platform 2.6. AAP-68957
- CVE-2026-32274 - Black: Arbitrary file writes from unsanitized user input in cache file name in:
- ansible-automation-platform-26/hub-rhel9 for Ansible Automation Platform 2.6. AAP-68421
- CVE-2026-32597 - PyJWT accepts unknown crit header extensions (RFC 7515 §4.1.11 MUST violation) in:
- ansible-automation-platform-26/hub-rhel9 for Ansible Automation Platform 2.6. AAP-68401
Platform Gateway Copy linkLink copied!
- CVE-2026-27459 - pyasn1: Denial of Service via unbounded recursion in ASN.1 decoding in:
- ansible-automation-platform-26/gateway-rhel9 for Ansible Automation Platform 2.6. AAP-69035
- CVE-2026-27606 - Rollup: Remote Code Execution via Path Traversal Vulnerability in:
- ansible-automation-platform-26/gateway-rhel9 for Ansible Automation Platform 2.6. AAP-66536
- CVE-2026-29074 - SVGO: Denial of Service via XML entity expansion in:
- automation-gateway for Ansible Automation Platform 2.6. AAP-68531
- CVE-2026-32597 - PyJWT accepts unknown crit header extensions (RFC 7515 §4.1.11 MUST violation) in:
- ansible-automation-platform-26/gateway-rhel9 for Ansible Automation Platform 2.6. AAP-68400
- CVE-2026-33154 - Dynaconf: Arbitrary code execution via Server-Side Template Injection in:
- ansible-automation-platform-26/gateway-rhel9 for Ansible Automation Platform 2.6. AAP-69466
Ansible Automation Platform UI Copy linkLink copied!
- CVE-2026-26996 - minimatch: Denial of Service via specially crafted glob patterns in:
- automation-platform-ui for Ansible Automation Platform 2.6. AAP-66292
- CVE-2026-27606 - Rollup: Remote Code Execution via Path Traversal Vulnerability in:
- automation-platform-ui for Ansible Automation Platform 2.6. AAP-66535
Event-Driven Ansible Copy linkLink copied!
- CVE-2026-24049 - wheel: Privilege escalation or arbitrary code execution via malicious wheel file unpacking in:
- ansible-automation-platform-26/eda-controller-rhel9-operator for Ansible Automation Platform 2.6. AAP-63863
- CVE-2026-26007 - cryptography: Subgroup Attack due to missing subgroup validation for SECT curves in:
- ansible-automation-platform-26/eda-controller-rhel9 for Ansible Automation Platform 2.6. AAP-65406
- CVE-2026-27459 - pyOpenSSL: DTLS cookie callback buffer overflow in:
- ansible-automation-platform-26/eda-controller-rhel9 for Ansible Automation Platform 2.6. AAP-68954
- CVE-2026-30922 - pyasn1: Denial of Service via unbounded recursion in:
- ansible-automation-platform-26/eda-controller-rhel9 for Ansible Automation Platform 2.6. AAP-69032
- CVE-2026-32597 - PyJWT accepts unknown crit header extensions (RFC 7515 §4.1.11 MUST violation) in:
- ansible-automation-platform-26/eda-controller-rhel9 for Ansible Automation Platform 2.6. AAP-68398
- CVE-2026-33154 - Dynaconf: Arbitrary code execution via Server-Side Template Injection in:
- ansible-automation-platform-26/eda-controller-rhel9 for Ansible Automation Platform 2.6. AAP-69465
Red Hat Ansible Lightspeed Copy linkLink copied!
- CVE-2025-69227 - aiohttp: Denial of Service via specially crafted POST request in:
- ansible-automation-platform/ansible-lightspeed-service-container(2.6) for Ansible Automation Platform 2.6. AAP-65586
- ansible-automation-platform/ansible-lightspeed-chatbot-container(2.6) for Ansible Automation Platform 2.6. AAP-65585
- CVE-2025-69228 - aiohttp: Denial of Service via memory exhaustion from crafted POST request in:
- ansible-automation-platform-26/ansible-lightspeed-service-container(2.6) for Ansible Automation Platform 2.6. AAP-65629
- ansible-automation-platform/ansible-lightspeed-chatbot-container(2.6) for Ansible Automation Platform 2.6. AAP-65627
- CVE-2026-0598 - Broken Object Level Authorization leading to cross-user AI conversation context injection in:
- ansible-automation-platform/ansible-wisdom-service for Ansible Automation Platform 2.6. AAP-64145
- CVE-2026-26007 - cryptography: Subgroup Attack due to missing subgroup validation for SECT curves in:
- ansible-automation-platform-26/mcp-tools-rhel9 for Ansible Automation Platform 2.6. AAP-71204
- ansible-automation-platform-26/lightspeed-rhel9 for Ansible Automation Platform 2.6. AAP-71203
- ansible-automation-platform-26/lightspeed-chatbot-rhel9 for Ansible Automation Platform 2.6. AAP-71202
- CVE-2026-27459 - pyOpenSSL: DTLS cookie callback buffer overflow in:
- ansible-automation-platform-26/lightspeed-rhel9 for Ansible Automation Platform 2.6. AAP-68958
- CVE-2026-29074 - SVGO: Denial of Service via XML entity expansion in:
- ansible-automation-platform-26/lightspeed-rhel9 for Ansible Automation Platform 2.6. AAP-68528
- CVE-2026-30922 - pyasn1: Denial of Service via unbounded recursion in:
- ansible-automation-platform-26/lightspeed-rhel9 for Ansible Automation Platform 2.6. AAP-69041
- CVE-2026-31812 - quinn-proto: Denial of Service via crafted QUIC Initial packet in:
- ansible-automation-platform-26/lightspeed-chatbot-rhel9 for Ansible Automation Platform 2.6. AAP-68140
- CVE-2026-32597 - PyJWT accepts unknown crit header extensions (RFC 7515 §4.1.11 MUST violation) in:
- ansible-automation-platform-26/mcp-tools-rhel9 for Ansible Automation Platform 2.6. AAP-68404
- ansible-automation-platform-26/lightspeed-rhel9 for Ansible Automation Platform 2.6. AAP-68403
- ansible-automation-platform-26/lightspeed-chatbot-rhel9 for Ansible Automation Platform 2.6. AAP-68402
- CVE-2026-33154 - Dynaconf: Arbitrary code execution via Server-Side Template Injection in:
- ansible-automation-platform-26/lightspeed-rhel9 for Ansible Automation Platform 2.6. AAP-69468
- CVE-2026-39373 - JWCrypto: Memory exhaustion via crafted compressed JWE tokens in:
- ansible-automation-platform-26/lightspeed-rhel9 for Ansible Automation Platform 2.6. AAP-71150
- CVE-2026-4800 - lodash: Arbitrary code execution via untrusted input in template imports in:
- ansible-automation-platform-26/lightspeed-rhel9 for Ansible Automation Platform 2.6. AAP-70458
Ansible Automation Platform security Copy linkLink copied!
- CVE-2026-35029 - LiteLLM: Remote code execution and privilege escalation via unrestricted proxy configuration endpoint in:
- redhat-user-workloads/lightspeed-chatbot-rhel9 for Ansible Automation Platform 2.6. AAP-70909
- CVE-2026-35030 - LiteLLM: Authentication bypass and privilege escalation via OIDC userinfo cache key collision in:
- redhat-user-workloads/lightspeed-chatbot-rhel9 for Ansible Automation Platform 2.6. AAP-70913
- CVE-2026-4926 - path-to-regexp: Denial of Service via crafted regular expressions in:
- ansible-automation-platform-tech-preview/mcp-server-rhel9 for Ansible Automation Platform 2.6. AAP-70022
Receptor Copy linkLink copied!
- CVE-2026-25679 - Incorrect parsing of IPv6 host literals in net/url in:
- ansible-automation-platform-26/receptor-rhel9 for Ansible Automation Platform 2.6. AAP-68747
- receptor for Ansible Automation Platform 2.6. AAP-68731
- CVE-2026-27137 - Incorrect enforcement of email constraints in crypto/x509 in:
- ansible-automation-platform-26/receptor-rhel9 for Ansible Automation Platform 2.6. AAP-68737
Bug fixes Copy linkLink copied!
Platform gateway Copy linkLink copied!
- Fixed an issue where organization administrators could not view, modify, or remove permissions on teams outside of their organization.(AAP-72502)
Automation Hub Copy linkLink copied!
- Fixed an issue where the Automation Hub OpenAPI specification was missing service_index endpoints.(AAP-72227)
- Fixed an issue where artifact download view counting could return an error instead of correctly using name/namespace.(AAP-71346)
Red Hat Lightspeed Copy linkLink copied!
- Fixed an issue where the containerized {RHLightspeed} install did not correctly configure the Azure OpenAI provider base URL for Llama Stack 0.4.3.(AAP-72046)
- Fixed an issue where the containerized {RHLightspeed} install did not correctly configure the Azure OpenAI provider base URL for Llama Stack 0.4.3.(AAP-71979)
- Fixed an issue where the /api/lightspeed/v1/ai/chat endpoint response schema could deviate from the documented API specification.(AAP-70666)
- Fixed an issue where MCP-enabled prompts could fail due to max_tokens handling and provider defaults in lightspeed-stack-providers.(AAP-70396)
- Fixed an issue where the wisdom-manage shell command output was impacted by the Django 5.2 verbosity level change.(AAP-69164)
- Fixed an issue where ALIA/Lightspeed backups were abnormally large due to unnecessary files being included.(AAP-68774)
- Fixed an issue where ALIA/Lightspeed backups were abnormally large due to unnecessary files being included.(AAP-67911)
Container-based installer Ansible Automation Platform Copy linkLink copied!
- Fixed an issue where component TLS certificates were not regenerated on certain CA certificate changes.(AAP-71956)
- Fixed an issue where the Redis hostname could fail to be set in disconnected containerized installer environments.(AAP-71493)
- Fixed an issue where the 2.6 bundle installer could fail when PCP was enabled with a metrics service host in inventory, by ensuring the PCP image is loaded on Automation Metrics nodes.(AAP-71026)
Django ansible base Copy linkLink copied!
- Fixed an issue where a fresh installation could immediately show a “RoleDefinition matching query does not exist” error during resource sync.(AAP-71868)
- Fixed an issue where periodic resource sync between Controller and Gateway could delete valid role assignments when pagination failed mid-fetch.(AAP-71775)
Content Copy linkLink copied!
- Fixed an issue where the ansible.controller collection job_template module did not support Bitbucket webhooks.(AAP-71827)
Event-Drive Ansible Copy linkLink copied!
- Fixed an issue where projects could be deleted while a project sync was running.(AAP-71406)
- Fixed an issue where the EDA event-stream node tag in gateway config could be incorrect, causing routing issues to EDA event-stream.(AAP-69827)
Automation controller Copy linkLink copied!
- Fixed an issue where nested workflows could apply incorrect variable precedence when set_stats artifacts were passed via extra_vars.(AAP-70756)
- Fixed an issue where object creation could be significantly slower in organizations with large numbers of resources, by reducing RoleEvaluation object creation overhead.(AAP-70752)
- Fixed an issue where inventory imports with large numbers of changes could take an excessive amount of time.(AAP-70377)
- Fixed an issue where concurrent jobs could incorrectly clear host facts due to a race condition.(AAP-69262)
- Fixed an issue where job cancellation did not reliably propagate to dependent jobs in workflows.(AAP-68975)
- Fixed an issue where project_update.yml could fail with a jinja2 error when using custom execution environment images with newer ansible-core versions.(AAP-68783)
Ansible Automation Platform Operator Copy linkLink copied!
- Fixed an issue where the Gateway Operator stored database passwords unencrypted, by removing postgresql-init ConfigMap and switching to runtime-executed postgresql modules.(AAP-70404)
- Fixed an issue where Automation Hub backup ignored postgres_image and postgres_image_version, causing it to always use the default PostgreSQL image.(AAP-69856)
- Fixed an issue where operator event creation could fail with a time-parsing error that masked the underlying error message.(AAP-69634)
- Fixed an issue where CRD validation for _image and _image_version fields was missing for installer operators.(AAP-68765)
- Fixed an issue where users could not override nested restore parameters (including
no_log) inAnsibleAutomationPlatformRestore.(AAP-68242)
Ansible Automation Platform ui Copy linkLink copied!
- Fixed an issue where unthrottled WebSocket refresh events caused excessive Jobs list API requests, leading to queued requests and an unresponsive UI under high concurrency.(AAP-70349)
- Fixed an issue where the Assign Roles wizard did not correctly show “System” as a resource type when assigning custom roles.(AAP-67506)
- Fixed an issue where OAuth authorization could fail to redirect correctly after Keycloak SSO because the next parameter was not preserved.(AAP-59343)
Receptor Copy linkLink copied!
- Fixed an issue where the work results command could emit misleading warnings during connection shutdown.(AAP-43847)