CVE-2025-48043
Bypass and runtime policies that can never pass may be incorrectly applied in filter authorization
Vulnerability description
Incorrect Authorization vulnerability in ash-project ash allows Authentication Bypass.This vulnerability is associated with program files lib/ash/policy/authorizer/authorizer.ex and program routines 'Elixir.Ash.Policy.Authorizer':strict_filters/2.
This issue affects ash: from pkg:hex/ash@0 before pkg:hex/ash@3.6.2, before 3.6.2, before 66d81300065b970da0d2f4528354835d2418c7ae.
Affected
pkg:hex/ash
| Source File | Routine |
|---|---|
lib/ash/policy/authorizer/authorizer.ex
|
Ash.Policy.Authorizer.strict_filters/2
|
pkg:github/ash-project/ash
| Source File | Routine |
|---|---|
lib/ash/policy/authorizer/authorizer.ex
|
Ash.Policy.Authorizer.strict_filters/2
|
| Status | Type | Version | Changes / Fixed in |
|---|---|---|---|
| affected | git ⓘ | initial
|
< 66d81300065b
|
References
- https://github.com/ash-project/ash/security/advisories/GHSA-7r7f-9xpj-jmr7 vendor-advisory
- https://github.com/ash-project/ash/commit/66d81300065b970da0d2f4528354835d2418c7ae patch
Credits
- Remediation reviewer: Zach Daniel
- Reporter: Jonatan Männchen
- Remediation developer: Jonatan Männchen
CVE record as JSON:
GET /cves/CVE-2025-48043.json
OSV record as JSON:
GET /osv/EEF-CVE-2025-48043.json