Not surprised by any of this.
One thing that sets this message apart and makes it unique from the 30 or so museum examples of Pigeon Service messages is that it contains 27 five-character blocks of encrypted content.
Messages not only comprise their message text, but also preambles, postambles and handling annotations that comprise other information about the message and its transmission. Comments elsewhere indicate XO2 was UK's Bomber Command in WWII. There are a number of items that are probably not part of the encrypted message but are message header material and relevant to its context that may be important to routing it to where the message itself can be properly decoded and its contents used. They are quite distinct from the 27 five-character blocks in the message body. The more enigmatic one of them is the AOAKN that is the first and last cypher block in the text. It may or may not be encrypted, part of the message or may serve some other purpose in the encryption/decryption or message itself. By looking at the writing, at least two, possibly three persons, or more, wrote on the message form. The 27 is most likely a check count of cypher blocks. There are 27 cypher blocks and the number 27 is most likely a check count for the message (in case it gets damaged en route). Another annotation not part of the 27 cypher blocks is the 1525/6 at the end of the cypher blocks. It may refer to an OTP serial number and page within the OTP or some other similar identifier to get to arrive at a correct decryption key by the recipient.
If OTPs were used with pigeons, there would be no guarantee as to which messages would arrive in what order, so some indicator would be needed to sequence the use of the OTP pages at the receiving end. Also note that there is a full-stop (i.e. period) at the end of each 12 cypher block group and one after the 1525/6 annotation. There are two other dots as well. They may be as simple as a pencil rest point when counting blocks, have other causes or have more significance. Also note that the digit 6 after the virgule follows the digit 5 before the virgule. This may be shorthand for 1525 and 1526 indicating that two pages of an OTP were used because the message exceeded the length of a single OTP page.
The message was sent by two different pigeons, their serial numbers both noted on this message. Something to note about these particular serial numbers is that neither are recorded in the British records of their military pigeon service which gives reasonable speculation, along with other information about where the pigeon was found and its likely flight path, that they were part of a very secret set of pigeons managed at Bletchley Park that belonged to MI6 (or its equivalent in WWII).
There is another annotation in roundhand (cursive) that appears to be "lib." followed a four-digit number that may or may not be a 24hr clock time. It may or may not be a reference to when the pigeons were released as opposed to when the message was created. It was written using the same type of writing instrument as the XO2. The cypher text and cypher notations ("27" and "1526/6") are in blue, along with the time of origin and the sender's signature. The rest are in black. Letter and number formations appear somewhat different between the blue and black. The blue may be from using a "blue" type carbon paper to create two identical copies of the original message and the other annotations in black from subsequent handling before being sent by the pigeon(s).
Another thing to keep in mind is that civilian non-commercial, commercial and military messaging very frequently use short-hand codes for standard message texts and handling. Typical non-military examples are Q signals, ARL signals, and commercially created telegram encoding to reduce the length of common message texts and eliminate the possiblity of transmission errors. One example from the US Amateur Radio Service used in Radiograms is ARL FIFTY where the prefix ARL indicates a numbered message text and FIFTY (spelled out) is the message identifier. The receiving end would translate ARL FIFTY to read "Greetings from Amateur Radio" before delivery to the designated recipient. It is a high enough probability that this encrypted message makes use of a short-hand code as well that it must be considered when looking for possible solutions.
Context is extremely relevant to understand what the structural elements mean and whether there is a structure to the encrypted portion that could help in decrypting it. Alternatives to a OTP could be a commonly posessed book or text from which indexed content could be used for encrypting or decrypting the message. Given that this was done in battlefield conditions, possibly clandestine conditions, the posession of an obvious OTP would be dangerous. It could be that the form on the pigeon is a transcription of a message encoded elsewhere. Reasons could include hiding content from message handlers as well as the enemy.
Something else to consider is the timeliness factor and importance of such a message. It would take up to several hours for the message to arrive so it was not used for instant information although it was used for important small-volume information that could not wait for possibly unavailable alternative courier methods.
If an OTP was used and the rest of the message preamble, postamble and handling annotations can't provide enough of a context for finding an extant OTP for this specific message, the message may never be decrypted. One of the things about OTPs was that, when the pages were used, they were destroyed to prevent any possible accidental re-use or compromise.