We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-32782

Ash Authentication email link auto-click account confirmation vulnerability



Description

Ash Authentication provides authentication for the Ash framework. The confirmation flow for account creation currently uses a GET request triggered by clicking a link sent via email. Some email clients and security tools (e.g., Outlook, virus scanners, and email previewers) may automatically follow these links, unintentionally confirming the account. This allows an attacker to register an account using another user’s email and potentially have it auto-confirmed by the victim’s email client. This does not allow attackers to take over or access existing accounts or private data. It is limited to account confirmation of new accounts only. This vulnerability is fixed in 4.7.0.

Reserved 2025-04-10 | Published 2025-04-15 | Updated 2025-04-16 | Assigner GitHub_M


MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-306: Missing Authentication for Critical Function

Product status

< 4.7.0
affected

References

github.com/...cation/security/advisories/GHSA-3988-q8q7-p787

github.com/...ommit/99ea38977fd4f421d2aaae0c2fb29f8e5f8f707d

cve.org (CVE-2025-32782)

nvd.nist.gov (CVE-2025-32782)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-32782

Support options

Helpdesk Chat, Email, Knowledgebase