Apache Cloudstack vulnerabilities
37 known vulnerabilities affecting apache/cloudstack.
Total CVEs
37
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL8HIGH10MEDIUM16LOW3
Vulnerabilities
Page 1 of 2
CVE-2025-59302MEDIUMCVSS 4.7≥ 4.18.0.0, < 4.20.2.0v4.21.0.02025-11-27
CVE-2025-59302 [MEDIUM] CWE-94 CVE-2025-59302: In Apache CloudStack improper control of generation of code ('Code Injection') vulnerability is fou
In Apache CloudStack improper control of generation of code ('Code Injection') vulnerability is found in the following APIs which are accessible only to admins.
* quotaTariffCreate
* quotaTariffUpdate
* createSecondaryStorageSelector
* updateSecondaryStorageSelector
* updateHost
* updateStorage
This issue affects Apache CloudStack: from 4.18.0 bef
nvd
CVE-2025-59454MEDIUMCVSS 4.3≥ 4.0.0, < 4.20.2.0v4.21.0.02025-11-27
CVE-2025-59454 [MEDIUM] CWE-200 CVE-2025-59454: In Apache CloudStack, a gap in access control checks affected the APIs - createNetworkACL
- listNetw
In Apache CloudStack, a gap in access control checks affected the APIs - createNetworkACL
- listNetworkACLs
- listResourceDetails
- listVirtualMachinesUsageHistory
- listVolumesUsageHistory
While these APIs were accessible only to authorized users, insufficient permission validation meant that users could occasionally access information beyond thei
nvd
CVE-2025-30675MEDIUMCVSS 4.7≥ 4.0.0, < 4.19.3.0≥ 4.20.0.0, < 4.20.1.02025-06-11
CVE-2025-30675 [MEDIUM] CWE-200 CVE-2025-30675: In Apache CloudStack, a flaw in access control affects the listTemplates and listIsos APIs. A malici
In Apache CloudStack, a flaw in access control affects the listTemplates and listIsos APIs. A malicious Domain Admin or Resource Admin can exploit this issue by intentionally specifying the 'domainid' parameter along with the 'filter=self' or 'filter=selfexecutable' values. This allows the attacker to gain unauthorized visibility into templates and
nvd
CVE-2025-47849HIGHCVSS 8.8≥ 4.10.0.0, < 4.19.3.0≥ 4.20.0.0, < 4.20.1.02025-06-10
CVE-2025-47849 [HIGH] CWE-269 CVE-2025-47849: A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0
A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can get the API key and secret key of user-accounts of Admin role type in the same domain. This operation is not appropriately restricted and allows the attacker to assume control over higher-privile
nvd
CVE-2025-47713HIGHCVSS 8.8≥ 4.10.0.0, < 4.19.3.0≥ 4.20.0.0, < 4.20.1.02025-06-10
CVE-2025-47713 [HIGH] CWE-269 CVE-2025-47713: A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0
A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can reset the password of user-accounts of Admin role type. This operation is not appropriately restricted and allows the attacker to assume control over higher-privileged user-accounts. A malicious
nvd
CVE-2025-26521HIGHCVSS 8.1≥ 4.17.0.0, < 4.19.3.0≥ 4.20.0.0, < 4.20.1.02025-06-10
CVE-2025-26521 [HIGH] CWE-200 CVE-2025-26521: When an Apache CloudStack user-account creates a CKS-based Kubernetes cluster in a project, the API
When an Apache CloudStack user-account creates a CKS-based Kubernetes cluster in a project, the API key and the secret key of the 'kubeadmin' user of the caller account are used to create the secret config in the CKS-based Kubernetes cluster. A member of the project who can access the CKS-based Kubernetes cluster, can also access the API key and secret
nvd
CVE-2025-22829LOWCVSS 2.3v4.20.0.02025-06-10
CVE-2025-22829 [LOW] CWE-269 CVE-2025-22829: The CloudStack Quota plugin has an improper privilege management logic in version 4.20.0.0. Anyone w
The CloudStack Quota plugin has an improper privilege management logic in version 4.20.0.0. Anyone with authenticated user-account access in CloudStack 4.20.0.0 environments, where this plugin is enabled and have access to specific APIs can enable or disable reception of quota-related emails for any account in the environment and list their configurati
nvd
CVE-2025-22828MEDIUMCVSS 4.3≥ 4.16.0.02025-01-13
CVE-2025-22828 [MEDIUM] CWE-200 CVE-2025-22828: CloudStack users can add and read comments (annotations) on resources they are authorised to access.
CloudStack users can add and read comments (annotations) on resources they are authorised to access.
Due to an access validation issue that affects Apache CloudStack versions from 4.16.0, users who have access, prior access or knowledge of resource UUIDs can list and add comments (annotations) to such resources.
An attacker with a user-account and
nvd
CVE-2024-50386CRITICALCVSS 9.9≥ 4.0.0, < 4.18.2.5≥ 4.19.0.0, < 4.19.1.32024-11-12
CVE-2024-50386 [HIGH] CWE-20 CVE-2024-50386: Account users in Apache CloudStack by default are allowed to register templates to be downloaded dir
Account users in Apache CloudStack by default are allowed to register templates to be downloaded directly to the primary storage for deploying instances. Due to missing validation checks for KVM-compatible templates in CloudStack 4.0.0 through 4.18.2.4 and 4.19.0.0 through 4.19.1.2, an attacker that can register templates, can use them to deploy malici
nvd
CVE-2024-45462HIGHCVSS 7.1≥ 4.15.1.0, < 4.18.2.4≥ 4.19.0.0, < 4.19.1.22024-10-16
CVE-2024-45462 [MEDIUM] CWE-613 CVE-2024-45462: The logout operation in the CloudStack web interface does not expire the user session completely whi
The logout operation in the CloudStack web interface does not expire the user session completely which is valid until expiry by time or restart of the backend service. An attacker that has access to a user's browser can use an unexpired session to gain access to resources owned by the logged out user account. This issue affects Apache CloudStack fro
nvd
CVE-2024-45219HIGHCVSS 8.5≥ 4.0.0, < 4.18.2.4≥ 4.19.0.0, < 4.19.1.22024-10-16
CVE-2024-45219 [HIGH] CWE-20 CVE-2024-45219: Account users in Apache CloudStack by default are allowed to upload and register templates for deplo
Account users in Apache CloudStack by default are allowed to upload and register templates for deploying instances and volumes for attaching them as data disks to their existing instances. Due to missing validation checks for KVM-compatible templates or volumes in CloudStack 4.0.0 through 4.18.2.3 and 4.19.0.0 through 4.19.1.1, an attacker that can upl
nvd
CVE-2024-45693HIGHCVSS 8.8≥ 4.15.1.0, < 4.18.2.4≥ 4.19.0.0, < 4.19.1.22024-10-16
CVE-2024-45693 [HIGH] CWE-352 CVE-2024-45693: Users logged into the Apache CloudStack's web interface can be tricked to submit malicious CSRF requ
Users logged into the Apache CloudStack's web interface can be tricked to submit malicious CSRF requests due to missing validation of the origin of the requests. This can allow an attacker to gain privileges and access to resources of the authenticated users and may lead to account takeover, disruption, exposure of sensitive data and compromise integr
nvd
CVE-2024-45461MEDIUMCVSS 6.3≥ 4.7.0, < 4.18.2.4≥ 4.19.0.0, < 4.19.1.22024-10-16
CVE-2024-45461 [MEDIUM] CWE-862 CVE-2024-45461: The CloudStack Quota feature allows cloud administrators to implement a quota or usage limit system
The CloudStack Quota feature allows cloud administrators to implement a quota or usage limit system for cloud resources, and is disabled by default. In environments where the feature is enabled, due to missing access check enforcements, non-administrative CloudStack user accounts are able to access and modify quota-related configurations and data. Th
nvd
CVE-2024-42062HIGHCVSS 7.2≥ 4.10.0.0, < 4.18.2.3≥ 4.19.0.0, < 4.19.1.12024-08-07
CVE-2024-42062 [HIGH] CWE-863 CVE-2024-42062: CloudStack account-users by default use username and password based authentication for API and UI ac
CloudStack account-users by default use username and password based authentication for API and UI access. Account-users can generate and register randomised API and secret keys and use them for the purpose of API-based automation and integrations. Due to an access permission validation issue that affects Apache CloudStack versions 4.10.0 up to 4.19.1.
nvd
CVE-2024-42222MEDIUMCVSS 4.3v4.19.1.02024-08-07
CVE-2024-42222 [MEDIUM] CWE-200 CVE-2024-42222: In Apache CloudStack 4.19.1.0, a regression in the network listing API allows unauthorised list acce
In Apache CloudStack 4.19.1.0, a regression in the network listing API allows unauthorised list access of network details for domain admin and normal user accounts. This vulnerability compromises tenant isolation, potentially leading to unauthorised access to network details, configurations and data.
Affected users are advised to upgrade to version
nvd
CVE-2024-41107HIGHCVSS 8.1PoC≥ 4.5.0, < 4.18.2.2≥ 4.19.0.0, < 4.19.1.02024-07-19
CVE-2024-41107 [HIGH] CWE-290 CVE-2024-41107: The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudS
The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and oth
nvd
CVE-2024-39864CRITICALCVSS 9.8≥ 4.0.0, < 4.18.2.1≥ 4.19.0.0, < 4.19.0.22024-07-05
CVE-2024-39864 [CRITICAL] CWE-94 CVE-2024-39864: The CloudStack integration API service allows running its unauthenticated API server (usually on por
The CloudStack integration API service allows running its unauthenticated API server (usually on port 8096 when configured and enabled via integration.api.port global setting) for internal portal integrations and for testing purposes. By default, the integration API service port is disabled and is considered disabled when integration.api.port is se
nvd
CVE-2024-38346CRITICALCVSS 9.8≥ 4.0.0, < 4.18.2.1≥ 4.19.0.0, < 4.19.0.22024-07-05
CVE-2024-38346 [CRITICAL] CWE-94 CVE-2024-38346: The CloudStack cluster service runs on unauthenticated port (default 9090) that can be misused to ru
The CloudStack cluster service runs on unauthenticated port (default 9090) that can be misused to run arbitrary commands on targeted hypervisors and CloudStack management server hosts. Some of these commands were found to have command injection vulnerabilities that can result in arbitrary code execution via agents on the hosts that may run as a pri
nvd
CVE-2024-29006CRITICALCVSS 9.8≥ 4.11.0.0, < 4.18.1.1v4.19.0.02024-04-04
CVE-2024-29006 [CRITICAL] CWE-290 CVE-2024-29006: By default the CloudStack management server honours the x-forwarded-for HTTP header and logs it as t
By default the CloudStack management server honours the x-forwarded-for HTTP header and logs it as the source IP of an API request. This could lead to authentication bypass and other operational problems should an attacker decide to spoof their IP address this way. Users are recommended to upgrade to CloudStack version 4.18.1.1 or 4.19.0.1, which
nvd
CVE-2024-29007HIGHCVSS 7.3≥ 4.9.1.0, < 4.18.1.1v4.19.0.02024-04-04
CVE-2024-29007 [HIGH] CWE-918 CVE-2024-29007: The CloudStack management server and secondary storage VM could be tricked into making requests to r
The CloudStack management server and secondary storage VM could be tricked into making requests to restricted or random resources by means of following 301 HTTP redirects presented by external servers when downloading templates or ISOs. Users are recommended to upgrade to version 4.18.1.1 or 4.19.0.1, which fixes this issue.
nvd
1 / 2Next →