CVE-2025-25202

Source
https://nvd.nist.gov/vuln/detail/CVE-2025-25202
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2025-25202.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2025-25202
Aliases
Published
2025-02-11T19:15:18Z
Modified
2025-02-12T08:55:32.635883Z
Summary
[none]
Details

Ash Authentication is an authentication framework for Elixir applications. Applications which have been bootstrapped by the igniter installer present since AshAuthentication v4.1.0 and who have used the magic link strategy or are manually revoking tokens are affected by revoked tokens being allowed to verify as valid. Unless one hase implemented any kind of custom token revocation feature in your application, then one will not be affected. The impact here for users using builtin functionality is that magic link tokens are reusable until they expire. With that said, magic link tokens are only valid for 10 minutes, so the surface area for abuse is extremely low here. The flaw is patched in version 4.4.9. Additionally a compile time warning is shown to users with remediation instructions if they upgrade. 4.4.9 ships with an upgrader, so those who use mix igniter.upgrade ash_authentication will have the necessary patch applied. Otherwise, one may run the upgrader manually as described in the error message. As a workaround, delete the generated :revoked? generic action in the token resource. This will cause it to use the one internal to Ash Authentication which has always been correct. Alternatively, manually make the changes that are included in the patch.

References

Affected packages

Git / github.com/team-alembic/ash_authentication

Affected ranges

Type
GIT
Repo
https://github.com/team-alembic/ash_authentication
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*

v0.1.0
v0.2.0
v0.2.1
v0.3.0
v0.4.1
v0.4.2
v0.4.3
v0.5.0
v0.6.0
v0.6.1

v1.*

v1.0.0

v2.*

v2.0.0
v2.0.1

v3.*

v3.0.0
v3.0.1
v3.0.2
v3.0.3
v3.0.4
v3.1.0
v3.10.0
v3.10.1
v3.10.2
v3.10.4
v3.10.5
v3.10.6
v3.10.7
v3.10.8
v3.11.0
v3.11.1
v3.11.10
v3.11.12
v3.11.13
v3.11.14
v3.11.15
v3.11.16
v3.11.2
v3.11.3
v3.11.4
v3.11.5
v3.11.6
v3.11.7
v3.11.8
v3.11.9
v3.12.0
v3.12.1
v3.12.2
v3.12.3
v3.12.4
v3.2.0
v3.2.1
v3.2.2
v3.3.0
v3.3.1
v3.4.0
v3.4.1
v3.4.2
v3.5.0
v3.5.1
v3.5.2
v3.5.3
v3.6.1
v3.7.0
v3.7.1
v3.7.2
v3.7.3
v3.7.4
v3.7.5
v3.7.6
v3.7.8
v3.7.9
v3.9.0
v3.9.2
v3.9.3
v3.9.4
v3.9.5
v3.9.6

v4.*

v4.0.0
v4.0.0-rc.0
v4.0.0-rc.1
v4.0.0-rc.2
v4.0.0-rc.3
v4.0.0-rc.4
v4.0.0-rc.5
v4.0.0-rc.6
v4.0.0-rc.7
v4.0.1
v4.0.2
v4.0.3
v4.0.4
v4.1.0
v4.2.0
v4.2.1
v4.2.2
v4.2.3
v4.2.5
v4.2.7
v4.3.0
v4.3.1
v4.3.10
v4.3.12
v4.3.2
v4.3.3
v4.3.4
v4.3.6
v4.3.7
v4.3.9
v4.4.0
v4.4.1
v4.4.2
v4.4.3
v4.4.4
v4.4.5
v4.4.6
v4.4.7
v4.4.8