ansible vulnerabilities

Radically simple IT automation

  • latest version

    12.1.0

  • latest non vulnerable version

  • first published

    12 years ago

  • latest version published

    15 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the ansible package. This does not include vulnerabilities belonging to this package’s dependencies.

    Fix vulnerabilities automatically

    Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.

    Fix for free
    VulnerabilityVulnerable Version
    • L
    Information Exposure

    [2.4.0.0,2.5.0)
    • M
    Information Exposure

    [,2.1.0.0)
    • M
    Credential Exposure

    [2.5.0,7.0.0)
    • M
    Information Exposure

    [,2.9.27)
    • H
    Arbitrary Code Execution

    [,2.5.6)[2.6.0,2.6.1)
    • H
    Improper Input Validation

    [,1.5.4)
    • M
    Insufficiently Protected Credentials

    [,1.5.5)
    • M
    Information Exposure

    [,1.5.5)
    • M
    Information Exposure

    [2.3.0.0,2.3.3.0)[2.4.0.0,2.4.1.0)
    • C
    Arbitrary Code Execution

    [,1.6.7)
    • M
    Insufficiently Protected Credentials

    [,1.5.5)
    • C
    Remote Code Execution (RCE)

    [,1.6.7)
    • H
    Denial of Service (DoS)

    [,1.2.1)
    • M
    Information Exposure

    [0,1.2.1)
    • M
    Information Exposure

    [,2.6.20)[2.7.0,2.7.14)[2.8.0,2.8.6)
    • H
    Arbitrary Code Execution

    [2.6.0,2.6.1)[2.5.0,2.5.6)[,2.4.6.0)
    • M
    Command Injection

    [,2.9.23)
    • M
    Information Exposure

    [,2.9.6)
    • M
    Information Exposure

    [2.9.0,2.9.7)[2.8.0,2.8.11)[2.7.0,2.7.17)
    • H
    Information Exposure

    [2.9.0,2.9.12)[2.8.0,2.8.6)[2.10.0a1,2.10.0)[,2.7.14)
    • M
    Information Exposure

    [0,2.8.20)[2.9.0,2.9.20)
    • M
    Information Exposure

    [,2.8.19)[2.9.0,2.9.18)
    • M
    Information Exposure

    [,2.8.19)[2.9.0,2.9.18)
    • M
    Information Exposure

    [,2.8.19)[2.9.0,2.9.18)[2.10.0,2.10.7)
    • M
    Information Exposure

    [,2.8.19)[2.9.0,2.9.18)
    • H
    Improper Verification of Cryptographic Signature

    [2.8.0,2.8.15)[2.9.0,2.9.13)
    • M
    Information Exposure

    [,2.8.14)[2.9.0,2.9.12)
    • M
    Information Exposure

    [,2.8.14)[2.9.0,2.9.12)
    • M
    Race Condition

    [2.9.0b1,2.9.10)[,2.8.13)
    • M
    Credential Exposure

    [2.7.0,2.7.17)[2.8.0,2.8.11)[2.9.0,2.9.7)
    • M
    Insecure Permissions

    [2.9.0,2.9.7)
    • H
    Remote Code Execution (RCE)

    [,2.7.17)[2.8.0,2.8.9)[2.9.0,2.9.6)
    • H
    Directory Traversal

    [2.7.0,2.7.17)[2.8.0a1,2.8.11)[2.9.0b1,2.9.7)
    • L
    Information Exposure

    [2.7.0,2.7.17)[2.8.0a1,2.8.11)[2.9.0b1,2.9.7)
    • H
    Arbitrary Code Execution

    [2.7.0,2.7.17)[2.8.0,2.8.11)[2.9.0,2.9.7)
    • M
    Information Exposure

    [2.7.0,2.7.17)[2.8.0,2.8.11)[2.9.0,2.9.7)
    • M
    Race Condition

    [,2.7.17)[2.8.0,2.8.9)[2.9.0,2.9.6)
    • L
    Information Exposure

    [2.7.0,2.7.17)[2.8.0a1,2.8.11)[2.9.0b1,2.9.7)
    • M
    Arbitrary File Write via Archive Extraction (Zip Slip)

    [,2.7.17)[2.8.0,2.8.9)[2.9.0,2.9.6)
    • C
    Arbitrary Command Execution

    [2.7.0,2.7.17)[2.8.0,2.8.11)[2.9.0,2.9.7)
    • M
    Information Exposure

    [2.7.0,2.7.17)[2.8.0a1,2.8.11)[2.9.0b1,2.9.7)
    • H
    Arbitrary Code Execution

    [2.9.0,2.9.3)[2.8.0,2.8.8)[,2.7.16)
    • H
    Arbitrary Code Injection

    [0,2.9.4)
    • M
    Improper Input Validation

    [2.8.0,2.8.6)[2.7.0,2.7.14)[,2.6.20)
    • M
    Information Exposure

    [2.8.0,2.8.4)
    • M
    Information Exposure

    [,2.6.19)[2.7.0,2.7.13)[2.8.0,2.8.4)
    • L
    Information Exposure

    [2.9.0b1,2.9.1)[2.8.0,2.8.7)[,2.7.15)
    • M
    Improper Input Validation

    [,2.2.1.0)
    • H
    Man-in-the-Middle (MitM)

    [,1.2.1)
    • H
    Arbitrary Code Execution

    [,1.6.6)
    • M
    Information Exposure

    [0,2.6.18)[2.8.0,2.8.2)[2.7.0,2.7.12)
    • M
    Directory Traversal

    [2.5.0,2.5.15)[2.6.0,2.6.14)[2.7.0,2.7.8)
    • L
    Information Exposure

    [,2.5.14)[2.6.0,2.6.11)[2.7.0,2.7.5)
    • M
    Information Exposure

    [,2.5.13)[2.6.0,2.6.10)[2.7.0,2.7.4)[2.7.5,2.8.1)
    • H
    Information Exposure

    [,2.7.1)
    • C
    Arbitrary Code Injection

    [,2.3.1.0)
    • H
    Information Exposure

    [,2.5.5)
    • H
    Arbitrary Code Execution

    [1.9,1.9.7)
    • H
    Arbitrary Command Execution

    [,2.1.4)[2.2.0,2.2.1)
    • C
    Arbitrary Command Execution

    [,2.1.3)
    • H
    Improper Key Validation

    [2,2.1.3)
    • H
    Arbitrary Code Execution

    [1.9.5,1.9.6)[2,2.0.2.0)
    • H
    Arbitrary Code Execution

    [,1.6.4)
    • L
    Symlink Attack

    [,1.2.3)
    • M
    Arbitrary File Overwrite

    [1.2,1.2.3)
    • H
    Symlink Attack

    [,1.9.2)
    • M
    Man-in-the-Middle (MitM)

    [,1.9.2)
    • H
    Arbitrary Code Execution

    [,1.5.4)

    Package versions

    404 VERSIONS IN TOTAL See all versions
    versionpublisheddirect vulnerabilities
    13.0.0a421 Oct, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    13.0.0a315 Oct, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    13.0.0a27 Oct, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    13.0.0a124 Sep, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    12.1.07 Oct, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    12.0.09 Sep, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    12.0.0rc12 Sep, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    12.0.0b526 Aug, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    12.0.0b421 Aug, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    12.0.0b35 Aug, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L