Missing Authentication for Critical Function Affecting ash_authentication package, versions <4.7.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment made by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.05% (17th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Missing Authentication for Critical Function vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-HEX-ASHAUTHENTICATION-9788143
  • published21 Apr 2025
  • disclosed15 Apr 2025
  • creditUnknown

Introduced: 15 Apr 2025

NewCVE-2025-32782  (opens in a new tab)
CWE-306  (opens in a new tab)

How to fix?

Upgrade ash_authentication to version 4.7.0 or higher.

Overview

Affected versions of this package are vulnerable to Missing Authentication for Critical Function via the confirmation flow for account creation which uses a GET request triggered by clicking a link sent via email. An attacker can register an account using another user's email and potentially have it auto-confirmed by the victim's email client.

Note: This does not allow attackers to take over or access existing accounts or private data. It is limited to account confirmation of new accounts only.

Workaround

Users unable to upgrade to the fixed version should disable the confirmation routes and create their own live view.

References

CVSS Base Scores

version 4.0
version 3.1