CVE-2025-48043
Bypass and runtime policies that can never pass may be incorrectly applied in filter authorization
CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
30th
Incorrect Authorization vulnerability in ash-project ash allows Authentication Bypass. This vulnerability is associated with program files lib/ash/policy/authorizer/authorizer.ex and program routines 'Elixir.Ash.Policy.Authorizer':strict_filters/2. This issue affects ash: from pkg:hex/ash@0 before pkg:hex/[email protected], before 3.6.2, before 66d81300065b970da0d2f4528354835d2418c7ae.
| CWE | CWE-863 |
| Vendor | ash-project |
| Product | ash |
| Published | Oct 10, 2025 |
| Last Updated | Apr 6, 2026 |
Stay Ahead of the Next One
Get instant alerts for ash-project ash
Be the first to know when new unknown vulnerabilities affecting ash-project ash are published — delivered to Slack, Telegram or Discord.
Get Free Alerts →
Free · No credit card · 60 sec setup
Affected Versions
ash-project / ash
0 < 3.6.2
ash-project / ash
0 < 66d81300065b970da0d2f4528354835d2418c7ae
References
github.com: https://github.com/ash-project/ash/security/advisories/GHSA-7r7f-9xpj-jmr7 cna.erlef.org: https://cna.erlef.org/cves/CVE-2025-48043.html osv.dev: https://osv.dev/vulnerability/EEF-CVE-2025-48043 github.com: https://github.com/ash-project/ash/commit/66d81300065b970da0d2f4528354835d2418c7ae
Credits
Zach Daniel 🔍 Jonatan Männchen Jonatan Männchen