🔐 CVE Alert

CVE-2025-48043

UNKNOWN 0.0

Bypass and runtime policies that can never pass may be incorrectly applied in filter authorization

CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
30th

Incorrect Authorization vulnerability in ash-project ash allows Authentication Bypass. This vulnerability is associated with program files lib/ash/policy/authorizer/authorizer.ex and program routines 'Elixir.Ash.Policy.Authorizer':strict_filters/2. This issue affects ash: from pkg:hex/ash@0 before pkg:hex/[email protected], before 3.6.2, before 66d81300065b970da0d2f4528354835d2418c7ae.

CWE CWE-863
Vendor ash-project
Product ash
Published Oct 10, 2025
Last Updated Apr 6, 2026
Stay Ahead of the Next One

Get instant alerts for ash-project ash

Be the first to know when new unknown vulnerabilities affecting ash-project ash are published — delivered to Slack, Telegram or Discord.

Get Free Alerts → Free · No credit card · 60 sec setup

Affected Versions

ash-project / ash
0 < 3.6.2
ash-project / ash
0 < 66d81300065b970da0d2f4528354835d2418c7ae

References

NVD ↗ CVE.org ↗ EPSS Data ↗
github.com: https://github.com/ash-project/ash/security/advisories/GHSA-7r7f-9xpj-jmr7 cna.erlef.org: https://cna.erlef.org/cves/CVE-2025-48043.html osv.dev: https://osv.dev/vulnerability/EEF-CVE-2025-48043 github.com: https://github.com/ash-project/ash/commit/66d81300065b970da0d2f4528354835d2418c7ae

Credits

Zach Daniel 🔍 Jonatan Männchen Jonatan Männchen