Description
Incorrect Authorization vulnerability in ash-project ash allows Authentication Bypass. This vulnerability is associated with program files lib/ash/policy/policy.ex and program routines 'Elixir.Ash.Policy.Policy':expression/2.

This issue affects ash: from pkg:hex/ash@3.6.3 before pkg:hex/ash@3.7.1, from 3.6.3 before 3.7.1, from 79749c2685ea031ebb2de8cf60cc5edced6a8dd0 before 8b83efa225f657bfc3656ad8ee8485f9b2de923d.
Published: 2025-10-17
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass
Action: Immediate Patch
AI Analysis

Impact

An incorrect authorization logic in ash-project's Ash framework lets a caller authenticate without proper credentials. The flaw resides in the policy evaluation code in lib/ash/policy/policy.ex and the function Elixir.Ash.Policy.Policy.expr/2, causing the system to treat an unauthorized request as authorized when the bypass policy condition evaluates to true. An attacker who can trigger this path could gain access to protected resources or elevate privileges, leading to a full compromise of confidentiality and integrity on the affected servers.

Affected Systems

The vulnerability affects the ash conductor component for all versions of ash from pkg:hex/ash@3.6.3 up to but not including pkg:hex/ash@3.7.1. Earlier releases before commit 8b83efa225f657bfc3656ad8ee8485f9b2de923d are also impacted. The impacted product is the Ash framework maintained by the ash-project; systems running any of these versions should treat the application as vulnerable.

Risk and Exploitability

The CVSS score of 8.6 reflects the high impact, yet the EPSS score of < 1% indicates a low current likelihood of exploitation in the wild. The issue is not listed in CISA's KEV catalog. Based on the description, the likely attack vector is an in-application trigger that evaluates a policy condition; once triggered, it permits a bypass of authentication without user interaction, making the vulnerability valuable to attackers.

Generated by OpenCVE AI on April 20, 2026 at 16:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the ash framework to version 3.7.1 or newer to apply the vendor patch.
  • Verify that no bypass policy conditions are enabled in the application configuration and that policy expressions evaluate correctly.
  • Re-test access controls to confirm that authentication is enforced after the update.

Generated by OpenCVE AI on April 20, 2026 at 16:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-pcxq-fjp3-r752 Ash has authorization bypass when bypass policy condition evaluates to true
History

Mon, 06 Apr 2026 16:45:00 +0000


Mon, 20 Oct 2025 20:00:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 17 Oct 2025 14:00:00 +0000

Type Values Removed Values Added
Description Incorrect Authorization vulnerability in ash-project ash allows Authentication Bypass. This vulnerability is associated with program files lib/ash/policy/policy.ex and program routines 'Elixir.Ash.Policy.Policy':expression/2. This issue affects ash: from pkg:hex/ash@3.6.3 before pkg:hex/ash@3.7.1, from 3.6.3 before 3.7.1, from 79749c2685ea031ebb2de8cf60cc5edced6a8dd0 before 8b83efa225f657bfc3656ad8ee8485f9b2de923d.
Title Authorization bypass when bypass policy condition evaluates to true
First Time appeared Ash-project
Ash-project ash
Weaknesses CWE-863
CPEs cpe:2.3:a:ash-project:ash:*:*:*:*:*:*:*:*
Vendors & Products Ash-project
Ash-project ash
References
Metrics cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: EEF

Published:

Updated: 2026-04-16T04:16:08.167Z

Reserved: 2025-05-15T08:40:25.455Z

Link: CVE-2025-48044

cve-icon Vulnrichment

Updated: 2025-10-20T18:42:41.664Z

cve-icon NVD

Status : Deferred

Published: 2025-10-17T14:15:46.403

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-48044

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T16:30:06Z

Weaknesses