ansible vulnerabilities

Radically simple IT automation

  • latest version

    12.0.0

  • latest non vulnerable version

  • first published

    12 years ago

  • latest version published

    6 days ago

  • licenses detected

  • Direct Vulnerabilities

    Known vulnerabilities in the ansible package. This does not include vulnerabilities belonging to this package’s dependencies.

    How to fix?

    Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.

    Fix for free
    VulnerabilityVulnerable Version
    • L
    Information Exposure

    [2.4.0.0,2.5.0)
    • M
    Information Exposure

    [,2.1.0.0)
    • M
    Credential Exposure

    [2.5.0,7.0.0)
    • M
    Information Exposure

    [,2.9.27)
    • H
    Arbitrary Code Execution

    [,2.5.6)[2.6.0,2.6.1)
    • H
    Improper Input Validation

    [,1.5.4)
    • M
    Insufficiently Protected Credentials

    [,1.5.5)
    • M
    Information Exposure

    [,1.5.5)
    • M
    Information Exposure

    [2.3.0.0,2.3.3.0)[2.4.0.0,2.4.1.0)
    • C
    Arbitrary Code Execution

    [,1.6.7)
    • M
    Insufficiently Protected Credentials

    [,1.5.5)
    • C
    Remote Code Execution (RCE)

    [,1.6.7)
    • H
    Denial of Service (DoS)

    [,1.2.1)
    • M
    Information Exposure

    [0,1.2.1)
    • M
    Information Exposure

    [,2.6.20)[2.7.0,2.7.14)[2.8.0,2.8.6)
    • H
    Arbitrary Code Execution

    [2.6.0,2.6.1)[2.5.0,2.5.6)[,2.4.6.0)
    • M
    Command Injection

    [,2.9.23)
    • M
    Information Exposure

    [,2.9.6)
    • M
    Information Exposure

    [2.9.0,2.9.7)[2.8.0,2.8.11)[2.7.0,2.7.17)
    • H
    Information Exposure

    [2.9.0,2.9.12)[2.8.0,2.8.6)[2.10.0a1,2.10.0)[,2.7.14)
    • M
    Information Exposure

    [0,2.8.20)[2.9.0,2.9.20)
    • M
    Information Exposure

    [,2.8.19)[2.9.0,2.9.18)
    • M
    Information Exposure

    [,2.8.19)[2.9.0,2.9.18)
    • M
    Information Exposure

    [,2.8.19)[2.9.0,2.9.18)[2.10.0,2.10.7)
    • M
    Information Exposure

    [,2.8.19)[2.9.0,2.9.18)
    • H
    Improper Verification of Cryptographic Signature

    [2.8.0,2.8.15)[2.9.0,2.9.13)
    • M
    Information Exposure

    [,2.8.14)[2.9.0,2.9.12)
    • M
    Information Exposure

    [,2.8.14)[2.9.0,2.9.12)
    • M
    Race Condition

    [2.9.0b1,2.9.10)[,2.8.13)
    • M
    Credential Exposure

    [2.7.0,2.7.17)[2.8.0,2.8.11)[2.9.0,2.9.7)
    • M
    Insecure Permissions

    [2.9.0,2.9.7)
    • H
    Remote Code Execution (RCE)

    [,2.7.17)[2.8.0,2.8.9)[2.9.0,2.9.6)
    • H
    Directory Traversal

    [2.7.0,2.7.17)[2.8.0a1,2.8.11)[2.9.0b1,2.9.7)
    • L
    Information Exposure

    [2.7.0,2.7.17)[2.8.0a1,2.8.11)[2.9.0b1,2.9.7)
    • H
    Arbitrary Code Execution

    [2.7.0,2.7.17)[2.8.0,2.8.11)[2.9.0,2.9.7)
    • M
    Information Exposure

    [2.7.0,2.7.17)[2.8.0,2.8.11)[2.9.0,2.9.7)
    • M
    Race Condition

    [,2.7.17)[2.8.0,2.8.9)[2.9.0,2.9.6)
    • L
    Information Exposure

    [2.7.0,2.7.17)[2.8.0a1,2.8.11)[2.9.0b1,2.9.7)
    • M
    Arbitrary File Write via Archive Extraction (Zip Slip)

    [,2.7.17)[2.8.0,2.8.9)[2.9.0,2.9.6)
    • C
    Arbitrary Command Execution

    [2.7.0,2.7.17)[2.8.0,2.8.11)[2.9.0,2.9.7)
    • M
    Information Exposure

    [2.7.0,2.7.17)[2.8.0a1,2.8.11)[2.9.0b1,2.9.7)
    • H
    Arbitrary Code Execution

    [2.9.0,2.9.3)[2.8.0,2.8.8)[,2.7.16)
    • H
    Arbitrary Code Injection

    [0,2.9.4)
    • M
    Improper Input Validation

    [2.8.0,2.8.6)[2.7.0,2.7.14)[,2.6.20)
    • M
    Information Exposure

    [2.8.0,2.8.4)
    • M
    Information Exposure

    [,2.6.19)[2.7.0,2.7.13)[2.8.0,2.8.4)
    • L
    Information Exposure

    [2.9.0b1,2.9.1)[2.8.0,2.8.7)[,2.7.15)
    • M
    Improper Input Validation

    [,2.2.1.0)
    • H
    Man-in-the-Middle (MitM)

    [,1.2.1)
    • H
    Arbitrary Code Execution

    [,1.6.6)
    • M
    Information Exposure

    [0,2.6.18)[2.8.0,2.8.2)[2.7.0,2.7.12)
    • M
    Directory Traversal

    [2.5.0,2.5.15)[2.6.0,2.6.14)[2.7.0,2.7.8)
    • L
    Information Exposure

    [,2.5.14)[2.6.0,2.6.11)[2.7.0,2.7.5)
    • M
    Information Exposure

    [,2.5.13)[2.6.0,2.6.10)[2.7.0,2.7.4)[2.7.5,2.8.1)
    • H
    Information Exposure

    [,2.7.1)
    • C
    Arbitrary Code Injection

    [,2.3.1.0)
    • H
    Information Exposure

    [,2.5.5)
    • H
    Arbitrary Code Execution

    [1.9,1.9.7)
    • H
    Arbitrary Command Execution

    [,2.1.4)[2.2.0,2.2.1)
    • C
    Arbitrary Command Execution

    [,2.1.3)
    • H
    Improper Key Validation

    [2,2.1.3)
    • H
    Arbitrary Code Execution

    [1.9.5,1.9.6)[2,2.0.2.0)
    • H
    Arbitrary Code Execution

    [,1.6.4)
    • L
    Symlink Attack

    [,1.2.3)
    • M
    Arbitrary File Overwrite

    [1.2,1.2.3)
    • H
    Symlink Attack

    [,1.9.2)
    • M
    Man-in-the-Middle (MitM)

    [,1.9.2)
    • H
    Arbitrary Code Execution

    [,1.5.4)

    Package versions

    398 VERSIONS IN TOTAL See all versions
    versionpublisheddirect vulnerabilities
    12.0.09 Sep, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    12.0.0rc12 Sep, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    12.0.0b526 Aug, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    12.0.0b421 Aug, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    12.0.0b35 Aug, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    12.0.0b229 Jul, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    12.0.0b122 Jul, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    12.0.0a99 Jul, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    12.0.0a81 Jul, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L
    12.0.0a725 Jun, 2025
    • 0
      C
    • 0
      H
    • 0
      M
    • 0
      L