{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-48043","assignerOrgId":"6b3ad84c-e1a6-4bf7-a703-f496b71e49db","state":"PUBLISHED","assignerShortName":"EEF","dateReserved":"2025-05-15T08:40:25.455Z","datePublished":"2025-10-10T15:57:29.225Z","dateUpdated":"2026-04-06T16:44:04.990Z"},"containers":{"cna":{"affected":[{"collectionURL":"https://repo.hex.pm","cpes":["cpe:2.3:a:ash-project:ash:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","packageName":"ash","packageURL":"pkg:hex/ash","product":"ash","programFiles":["lib/ash/policy/authorizer/authorizer.ex"],"programRoutines":[{"name":"'Elixir.Ash.Policy.Authorizer':strict_filters/2"}],"repo":"https://github.com/ash-project/ash","vendor":"ash-project","versions":[{"lessThan":"3.6.2","status":"affected","version":"0","versionType":"semver"}]},{"collectionURL":"https://github.com","cpes":["cpe:2.3:a:ash-project:ash:*:*:*:*:*:*:*:*"],"defaultStatus":"unaffected","packageName":"ash-project/ash","packageURL":"pkg:github/ash-project/ash","product":"ash","programFiles":["lib/ash/policy/authorizer/authorizer.ex"],"programRoutines":[{"name":"'Elixir.Ash.Policy.Authorizer':strict_filters/2"}],"repo":"https://github.com/ash-project/ash","vendor":"ash-project","versions":[{"lessThan":"66d81300065b970da0d2f4528354835d2418c7ae","status":"affected","version":"0","versionType":"git"}]}],"cpeApplicability":[{"nodes":[{"cpeMatch":[{"criteria":"cpe:2.3:a:ash-project:ash:*:*:*:*:*:*:*:*","versionEndExcluding":"3.6.2","vulnerable":true}],"negate":false,"operator":"AND"}],"operator":"AND"}],"credits":[{"lang":"en","type":"remediation reviewer","value":"Zach Daniel"},{"lang":"en","type":"reporter","value":"Jonatan Männchen"},{"lang":"en","type":"remediation developer","value":"Jonatan Männchen"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Incorrect Authorization vulnerability in ash-project ash allows Authentication Bypass.<p> This vulnerability is associated with program files <tt>lib/ash/policy/authorizer/authorizer.ex</tt> and program routines <tt>'Elixir.Ash.Policy.Authorizer':strict_filters/2</tt>.</p><p>This issue affects ash: from pkg:hex/ash@0 before pkg:hex/ash@3.6.2, before 3.6.2, before 66d81300065b970da0d2f4528354835d2418c7ae.</p>"}],"value":"Incorrect Authorization vulnerability in ash-project ash allows Authentication Bypass. This vulnerability is associated with program files lib/ash/policy/authorizer/authorizer.ex and program routines 'Elixir.Ash.Policy.Authorizer':strict_filters/2.\n\nThis issue affects ash: from pkg:hex/ash@0 before pkg:hex/ash@3.6.2, before 3.6.2, before 66d81300065b970da0d2f4528354835d2418c7ae."}],"impacts":[{"capecId":"CAPEC-115","descriptions":[{"lang":"en","value":"CAPEC-115 Authentication Bypass"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":8.6,"baseSeverity":"HIGH","privilegesRequired":"LOW","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-863","description":"CWE-863 Incorrect Authorization","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"6b3ad84c-e1a6-4bf7-a703-f496b71e49db","shortName":"EEF","dateUpdated":"2026-04-06T16:44:04.990Z"},"references":[{"tags":["vendor-advisory","related"],"url":"https://github.com/ash-project/ash/security/advisories/GHSA-7r7f-9xpj-jmr7"},{"tags":["related"],"url":"https://cna.erlef.org/cves/CVE-2025-48043.html"},{"tags":["related"],"url":"https://osv.dev/vulnerability/EEF-CVE-2025-48043"},{"tags":["patch"],"url":"https://github.com/ash-project/ash/commit/66d81300065b970da0d2f4528354835d2418c7ae"}],"source":{"discovery":"USER"},"title":"Bypass and runtime policies that can never pass may be incorrectly applied in filter authorization","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-10-10T16:33:21.270063Z","id":"CVE-2025-48043","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-10T16:45:42.403Z"}}]}}