Description
Incorrect Authorization vulnerability in ash-project ash allows Exploiting Incorrectly Configured Access Control Security Levels. This vulnerability is associated with program files lib/ash/actions/create/bulk.ex, lib/ash/actions/destroy/bulk.ex, lib/ash/actions/update/bulk.ex and program routines 'Elixir.Ash.Actions.Create.Bulk':run/5, 'Elixir.Ash.Actions.Destroy.Bulk':run/6, 'Elixir.Ash.Actions.Update.Bulk:run'/6.

This issue affects ash: from pkg:hex/ash before pkg:hex/ash@3.5.39, before 3.5.39, before 5d1b6a5d00771fd468a509778637527b5218be9a.
Published: 2025-09-07
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Authorization Bypass on bulk actions
Action: Apply Patch
AI Analysis

Impact

An incorrect authorization flaw in the ash framework allows certain action hooks to run even when the request is marked as forbidden. The vulnerability affects the bulk create, destroy, and update actions, enabling an attacker to execute unintended operations on collections of resources. This leads to a loss of integrity, as unauthorized bulk changes can be made without proper permission checks, consistent with CWE‑863.

Affected Systems

ash-project's ash library is impacted. All releases prior to version 3.5.39, and any builds before the commit 5d1b6a5d00771fd468a509778637527b5218be9a, contain the flaw. This includes every package hosted on hex for those versions. The flaw resides in the files lib/ash/actions/create/bulk.ex, lib/ash/actions/destroy/bulk.ex, and lib/ash/actions/update/bulk.ex.

Risk and Exploitability

The CVSS score of 7.1 indicates moderate-to-high severity, while the EPSS score of less than 1% suggests a low likelihood of public exploitation. The vulnerability is not listed in CISA KEV. According to the description, an attacker can trigger forbidden action hooks to perform bulk operations, but the CVE does not specify the exact prerequisites. It is inferred that some level of authentication or privilege may be required, though this inference is not explicitly stated. The attack appears to involve sending requests to an ash-based service, indicating a likely network-based vector, although this inference is not directly supported by the CVE data.

Generated by OpenCVE AI on April 28, 2026 at 00:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ash to version 3.5.39 or later to receive the authorization fix.
  • Apply the patch from commit 5d1b6a5d00771fd468a509778637527b5218be9a that restores the proper permission check in the bulk action modules.
  • Ensure that all bulk‑action endpoints enforce the correct authorization policy and review access logs for unauthorized invocations.

Generated by OpenCVE AI on April 28, 2026 at 00:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-27096 Before action, Ash's hooks may execute in certain scenarios despite a request being forbidden
Github GHSA Github GHSA GHSA-jj4j-x5ww-cwh9 Before action, Ash's hooks may execute in certain scenarios despite a request being forbidden
History

Mon, 06 Apr 2026 16:45:00 +0000


Mon, 08 Sep 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 07 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Description Incorrect Authorization vulnerability in ash-project ash allows Exploiting Incorrectly Configured Access Control Security Levels. This vulnerability is associated with program files lib/ash/actions/create/bulk.ex, lib/ash/actions/destroy/bulk.ex, lib/ash/actions/update/bulk.ex and program routines 'Elixir.Ash.Actions.Create.Bulk':run/5, 'Elixir.Ash.Actions.Destroy.Bulk':run/6, 'Elixir.Ash.Actions.Update.Bulk:run'/6. This issue affects ash: from pkg:hex/ash before pkg:hex/ash@3.5.39, before 3.5.39, before 5d1b6a5d00771fd468a509778637527b5218be9a.
Title Before action hooks may execute in certain scenarios despite a request being forbidden
First Time appeared Ash-project
Ash-project ash
Weaknesses CWE-863
CPEs cpe:2.3:a:ash-project:ash:*:*:*:*:*:*:*:*
Vendors & Products Ash-project
Ash-project ash
References
Metrics cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: EEF

Published:

Updated: 2026-04-06T16:44:06.316Z

Reserved: 2025-05-15T08:40:25.455Z

Link: CVE-2025-48042

cve-icon Vulnrichment

Updated: 2025-09-08T18:55:06.932Z

cve-icon NVD

Status : Deferred

Published: 2025-09-07T16:15:51.240

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-48042

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T00:30:15Z

Weaknesses