Home

Description

Incorrect Authorization vulnerability in ash-project ash allows Exploiting Incorrectly Configured Access Control Security Levels. This vulnerability is associated with program files lib/ash/actions/create/bulk.ex, lib/ash/actions/destroy/bulk.ex, lib/ash/actions/update/bulk.ex and program routines 'Elixir.Ash.Actions.Create.Bulk':run/5, 'Elixir.Ash.Actions.Destroy.Bulk':run/6, 'Elixir.Ash.Actions.Update.Bulk:run'/6. This issue affects ash: from pkg:hex/ash before pkg:hex/ash@3.5.39, before 3.5.39, before 5d1b6a5d00771fd468a509778637527b5218be9a.

PUBLISHED Reserved 2025-05-15 | Published 2025-09-07 | Updated 2025-09-09 | Assigner EEF




HIGH: 7.1CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-863 Incorrect Authorization

Product status

Default status
unaffected

pkg:hex/ash@0 (purl) before pkg:hex/ash@3.5.39
affected

Any version before 3.5.39
affected

Any version before 5d1b6a5d00771fd468a509778637527b5218be9a
affected

Credits

Zach Daniel remediation developer

Jonatan Männchen analyst

References

github.com/...ct/ash/security/advisories/GHSA-jj4j-x5ww-cwh9 vendor-advisory

github.com/...ommit/5d1b6a5d00771fd468a509778637527b5218be9a patch

cve.org (CVE-2025-48042)

nvd.nist.gov (CVE-2025-48042)

Download JSON