Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-4754: CWE-613 Insufficient Session Expiration in ash-project ash_authentication_phoenix

0
Low
VulnerabilityCVE-2025-4754cvecve-2025-4754cwe-613
Published: Tue Jun 17 2025 (06/17/2025, 14:31:37 UTC)
Source: CVE Database V5
Vendor/Project: ash-project
Product: ash_authentication_phoenix

Description

Insufficient Session Expiration vulnerability in ash-project ash_authentication_phoenix allows Session Hijacking. This vulnerability is associated with program files lib/ash_authentication_phoenix/controller.ex. This issue affects ash_authentication_phoenix until 2.10.0.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 14:56:18 UTC

Technical Analysis

CVE-2025-4754 identifies a vulnerability classified under CWE-613 (Insufficient Session Expiration) in the ash_authentication_phoenix component of the ash-project, an Elixir-based authentication library. The vulnerability is located in the lib/ash_authentication_phoenix/controller.ex file and affects all versions up to 2.10.0. The core issue is that session tokens or identifiers are not invalidated or expired properly after a certain period or upon logout, allowing an attacker who obtains a valid session token to hijack the session and impersonate the legitimate user. The vulnerability can be exploited remotely over the network without requiring privileges but does require user interaction, such as clicking a malicious link or performing an action that triggers session reuse. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), partial attack traceability (AT:P), no privileges required (PR:N), user interaction required (UI:P), low impact on confidentiality and integrity (VC:L, VI:L), and no impact on availability (VA:N). No known exploits have been reported in the wild, and no patches are currently linked, indicating that mitigation may require manual configuration or updates once available. The vulnerability poses a risk primarily to applications and services that rely on ash_authentication_phoenix for session management and authentication, potentially exposing user accounts to session hijacking attacks if session expiration is not enforced properly.

Potential Impact

The primary impact of this vulnerability is session hijacking, which can lead to unauthorized access to user accounts and sensitive information. While the CVSS score is low, the actual risk depends on the context of deployment and the sensitivity of the protected resources. Organizations using ash_authentication_phoenix in web applications or APIs may face risks of account compromise, especially if session tokens are long-lived or not invalidated after logout. This can undermine user trust, lead to data breaches, and potentially facilitate further attacks such as privilege escalation or data exfiltration. Since the vulnerability requires user interaction, phishing or social engineering could be used to exploit it. The lack of known exploits suggests limited current threat activity, but the vulnerability remains a latent risk until addressed. The impact is more pronounced in environments with high-value targets or where session management is critical for security compliance.

Mitigation Recommendations

Organizations should immediately review their session management policies when using ash_authentication_phoenix and implement strict session expiration controls. This includes setting short session lifetimes, enforcing token invalidation upon logout, and monitoring for unusual session activity. Developers should upgrade to versions beyond 2.10.0 once patches are released or apply any available security updates promptly. In the interim, consider implementing additional layers of security such as multi-factor authentication (MFA) to reduce the risk of session hijacking. Employ secure cookie attributes (HttpOnly, Secure, SameSite) to protect session tokens from interception. Regularly audit session handling code and conduct penetration testing focused on session management. User education on phishing risks can reduce the likelihood of user interaction-based exploitation. Finally, monitor security advisories from ash-project for updates or patches addressing this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
EEF
Date Reserved
2025-05-15T09:03:11.355Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68517cf5a8c921274385d335

Added to database: 6/17/2025, 2:34:29 PM

Last enriched: 2/28/2026, 2:56:18 PM

Last updated: 3/24/2026, 8:47:44 PM

Views: 93

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses