CVE-2025-48043
Bypass and runtime policies that can never pass may be incorrectly applied in filter authorization
Vulnerability description
Incorrect Authorization vulnerability in ash-project ash allows Authentication Bypass.This vulnerability is associated with program files lib/ash/policy/authorizer/authorizer.ex and program routines 'Elixir.Ash.Policy.Authorizer':strict_filters/2.
This issue affects ash: from pkg:hex/ash@0 before pkg:hex/ash@3.6.2, before 3.6.2, before 66d81300065b970da0d2f4528354835d2418c7ae.
Affected
ash-project / ash
Source File | Routine |
---|---|
lib/ash/policy/authorizer/authorizer.ex |
'Elixir.Ash.Policy.Authorizer':strict_filters/2 |
Status | Version | Changes / Fixed in |
---|---|---|
affected | pkg:hex/ash@0 |
< pkg:hex/ash@3.6.2
|
affected | 0 |
< 3.6.2
|
affected | 0 |
< 66d81300065b970da0d2f4528354835d2418c7ae
|
References
- https://github.com/ash-project/ash/security/advisories/GHSA-7r7f-9xpj-jmr7 vendor-advisory
- https://github.com/ash-project/ash/commit/66d81300065b970da0d2f4528354835d2418c7ae patch
Credits
- Remediation reviewer: Zach Daniel
- Reporter: Jonatan Männchen
- Remediation developer: Jonatan Männchen
CVE record as JSON:
GET /cves/cve-2025-48043.json