Apache Software Foundation Apache Cloudstack vulnerabilities

24 known vulnerabilities affecting apache_software_foundation/apache_cloudstack.

Total CVEs
24
CISA KEV
0
Public exploits
1
Exploited in wild
0
Severity breakdown
CRITICAL6HIGH10MEDIUM7LOW1

Vulnerabilities

Page 1 of 2
CVE-2025-59302MEDIUMCVSS 4.7≥ 4.18.0, < 4.20.2≥ 4.21.0, < 4.22.02025-11-27
CVE-2025-59302 [MEDIUM] CWE-94 CVE-2025-59302: In Apache CloudStack improper control of generation of code ('Code Injection') vulnerability is fou In Apache CloudStack improper control of generation of code ('Code Injection') vulnerability is found in the following APIs which are accessible only to admins. * quotaTariffCreate * quotaTariffUpdate * createSecondaryStorageSelector * updateSecondaryStorageSelector * updateHost * updateStorage This issue affects Apache CloudStack: from 4.18.0 bef
cvelistv5nvd
CVE-2025-59454MEDIUMCVSS 4.3≥ 4.0.0, < 4.20.2≥ 4.21.0, < 4.22.02025-11-27
CVE-2025-59454 [MEDIUM] CWE-200 CVE-2025-59454: In Apache CloudStack, a gap in access control checks affected the APIs - createNetworkACL - listNetw In Apache CloudStack, a gap in access control checks affected the APIs - createNetworkACL - listNetworkACLs - listResourceDetails - listVirtualMachinesUsageHistory - listVolumesUsageHistory While these APIs were accessible only to authorized users, insufficient permission validation meant that users could occasionally access information beyond thei
cvelistv5nvd
CVE-2025-30675MEDIUMCVSS 4.7≥ 4.0.0, < 4.19.3.0≥ 4.20.0.0, < 4.20.1.02025-06-11
CVE-2025-30675 [MEDIUM] CWE-200 CVE-2025-30675: In Apache CloudStack, a flaw in access control affects the listTemplates and listIsos APIs. A malici In Apache CloudStack, a flaw in access control affects the listTemplates and listIsos APIs. A malicious Domain Admin or Resource Admin can exploit this issue by intentionally specifying the 'domainid' parameter along with the 'filter=self' or 'filter=selfexecutable' values. This allows the attacker to gain unauthorized visibility into templates and
cvelistv5nvd
CVE-2025-47713HIGHCVSS 8.8≥ 4.10.0, < 4.19.3.0≥ 4.20.0.0, < 4.20.1.02025-06-10
CVE-2025-47713 [HIGH] CWE-269 CVE-2025-47713: A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can reset the password of user-accounts of Admin role type. This operation is not appropriately restricted and allows the attacker to assume control over higher-privileged user-accounts. A malicious
cvelistv5nvd
CVE-2025-47849HIGHCVSS 8.8≥ 4.10.0, < 4.19.3.0≥ 4.20.0.0, < 4.20.1.02025-06-10
CVE-2025-47849 [HIGH] CWE-269 CVE-2025-47849: A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can get the API key and secret key of user-accounts of Admin role type in the same domain. This operation is not appropriately restricted and allows the attacker to assume control over higher-privile
cvelistv5nvd
CVE-2025-26521HIGHCVSS 8.1≥ 4.17.0.0, < 4.19.3.0≥ 4.20.0.0, < 4.20.1.02025-06-10
CVE-2025-26521 [HIGH] CWE-200 CVE-2025-26521: When an Apache CloudStack user-account creates a CKS-based Kubernetes cluster in a project, the API When an Apache CloudStack user-account creates a CKS-based Kubernetes cluster in a project, the API key and the secret key of the 'kubeadmin' user of the caller account are used to create the secret config in the CKS-based Kubernetes cluster. A member of the project who can access the CKS-based Kubernetes cluster, can also access the API key and secret
cvelistv5nvd
CVE-2025-22829LOWCVSS 2.3≥ 4.20.0.0, < 4.20.1.02025-06-10
CVE-2025-22829 [LOW] CWE-269 CVE-2025-22829: The CloudStack Quota plugin has an improper privilege management logic in version 4.20.0.0. Anyone w The CloudStack Quota plugin has an improper privilege management logic in version 4.20.0.0. Anyone with authenticated user-account access in CloudStack 4.20.0.0 environments, where this plugin is enabled and have access to specific APIs can enable or disable reception of quota-related emails for any account in the environment and list their configurati
cvelistv5nvd
CVE-2025-22828MEDIUMCVSS 4.3≥ 4.16.0, ≤ *2025-01-13
CVE-2025-22828 [MEDIUM] CWE-200 CVE-2025-22828: CloudStack users can add and read comments (annotations) on resources they are authorised to access. CloudStack users can add and read comments (annotations) on resources they are authorised to access. Due to an access validation issue that affects Apache CloudStack versions from 4.16.0, users who have access, prior access or knowledge of resource UUIDs can list and add comments (annotations) to such resources. An attacker with a user-account and
cvelistv5nvd
CVE-2024-50386CRITICALCVSS 9.9≥ 4.0.0, ≤ 4.18.2.4≥ 4.19.0.0, ≤ 4.19.1.22024-11-12
CVE-2024-50386 [HIGH] CWE-20 CVE-2024-50386: Account users in Apache CloudStack by default are allowed to register templates to be downloaded dir Account users in Apache CloudStack by default are allowed to register templates to be downloaded directly to the primary storage for deploying instances. Due to missing validation checks for KVM-compatible templates in CloudStack 4.0.0 through 4.18.2.4 and 4.19.0.0 through 4.19.1.2, an attacker that can register templates, can use them to deploy malici
cvelistv5nvd
CVE-2024-45693HIGHCVSS 8.8≥ 4.15.1.0, ≤ 4.18.2.3≥ 4.19.0.0, ≤ 4.19.1.12024-10-16
CVE-2024-45693 [HIGH] CWE-352 CVE-2024-45693: Users logged into the Apache CloudStack's web interface can be tricked to submit malicious CSRF requ Users logged into the Apache CloudStack's web interface can be tricked to submit malicious CSRF requests due to missing validation of the origin of the requests. This can allow an attacker to gain privileges and access to resources of the authenticated users and may lead to account takeover, disruption, exposure of sensitive data and compromise integr
cvelistv5nvd
CVE-2024-45462HIGHCVSS 7.1≥ 4.15.1.0, ≤ 4.18.2.3≥ 4.19.0.0, ≤ 4.19.1.12024-10-16
CVE-2024-45462 [MEDIUM] CWE-613 CVE-2024-45462: The logout operation in the CloudStack web interface does not expire the user session completely whi The logout operation in the CloudStack web interface does not expire the user session completely which is valid until expiry by time or restart of the backend service. An attacker that has access to a user's browser can use an unexpired session to gain access to resources owned by the logged out user account. This issue affects Apache CloudStack fro
cvelistv5nvd
CVE-2024-45219HIGHCVSS 8.5≥ 4.0.0, ≤ 4.18.2.3≥ 4.19.0.0, ≤ 4.19.1.12024-10-16
CVE-2024-45219 [HIGH] CWE-20 CVE-2024-45219: Account users in Apache CloudStack by default are allowed to upload and register templates for deplo Account users in Apache CloudStack by default are allowed to upload and register templates for deploying instances and volumes for attaching them as data disks to their existing instances. Due to missing validation checks for KVM-compatible templates or volumes in CloudStack 4.0.0 through 4.18.2.3 and 4.19.0.0 through 4.19.1.1, an attacker that can upl
cvelistv5nvd
CVE-2024-42062HIGHCVSS 7.2≥ 4.10.0, ≤ 4.18.2.2≥ 4.19.0.0, ≤ 4.19.1.02024-08-07
CVE-2024-42062 [HIGH] CWE-863 CVE-2024-42062: CloudStack account-users by default use username and password based authentication for API and UI ac CloudStack account-users by default use username and password based authentication for API and UI access. Account-users can generate and register randomised API and secret keys and use them for the purpose of API-based automation and integrations. Due to an access permission validation issue that affects Apache CloudStack versions 4.10.0 up to 4.19.1.
cvelistv5nvd
CVE-2024-42222MEDIUMCVSS 4.3v4.19.1.02024-08-07
CVE-2024-42222 [MEDIUM] CWE-200 CVE-2024-42222: In Apache CloudStack 4.19.1.0, a regression in the network listing API allows unauthorised list acce In Apache CloudStack 4.19.1.0, a regression in the network listing API allows unauthorised list access of network details for domain admin and normal user accounts. This vulnerability compromises tenant isolation, potentially leading to unauthorised access to network details, configurations and data. Affected users are advised to upgrade to version
cvelistv5nvd
CVE-2024-41107HIGHCVSS 8.1PoC≥ 4.5.0, ≤ 4.18.2.1≥ 4.19.0.0, ≤ 4.19.0.22024-07-19
CVE-2024-41107 [HIGH] CWE-290 CVE-2024-41107: The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudS The CloudStack SAML authentication (disabled by default) does not enforce signature check. In CloudStack environments where SAML authentication is enabled, an attacker that initiates CloudStack SAML single sign-on authentication can bypass SAML authentication by submitting a spoofed SAML response with no signature and known or guessed username and oth
cvelistv5nvd
CVE-2024-39864CRITICALCVSS 9.8≥ 4.0.0, ≤ 4.18.2.0≥ 4.19.0.0, ≤ 4.19.0.12024-07-05
CVE-2024-39864 [CRITICAL] CWE-94 CVE-2024-39864: The CloudStack integration API service allows running its unauthenticated API server (usually on por The CloudStack integration API service allows running its unauthenticated API server (usually on port 8096 when configured and enabled via integration.api.port global setting) for internal portal integrations and for testing purposes. By default, the integration API service port is disabled and is considered disabled when integration.api.port is se
cvelistv5nvd
CVE-2024-38346CRITICALCVSS 9.8≥ 4.0.0, ≤ 4.18.2.0≥ 4.19.0.0, ≤ 4.19.0.12024-07-05
CVE-2024-38346 [CRITICAL] CWE-94 CVE-2024-38346: The CloudStack cluster service runs on unauthenticated port (default 9090) that can be misused to ru The CloudStack cluster service runs on unauthenticated port (default 9090) that can be misused to run arbitrary commands on targeted hypervisors and CloudStack management server hosts. Some of these commands were found to have command injection vulnerabilities that can result in arbitrary code execution via agents on the hosts that may run as a pri
cvelistv5nvd
CVE-2024-29006CRITICALCVSS 9.8≥ 4.11.0.0, ≤ 4.18.1.0v4.19.0.02024-04-04
CVE-2024-29006 [CRITICAL] CWE-290 CVE-2024-29006: By default the CloudStack management server honours the x-forwarded-for HTTP header and logs it as t By default the CloudStack management server honours the x-forwarded-for HTTP header and logs it as the source IP of an API request. This could lead to authentication bypass and other operational problems should an attacker decide to spoof their IP address this way. Users are recommended to upgrade to CloudStack version 4.18.1.1 or 4.19.0.1, which
cvelistv5nvd
CVE-2024-29007HIGHCVSS 7.3≥ 4.9.1.0, ≤ 4.18.1.0v4.19.0.02024-04-04
CVE-2024-29007 [HIGH] CWE-918 CVE-2024-29007: The CloudStack management server and secondary storage VM could be tricked into making requests to r The CloudStack management server and secondary storage VM could be tricked into making requests to restricted or random resources by means of following 301 HTTP redirects presented by external servers when downloading templates or ISOs. Users are recommended to upgrade to version 4.18.1.1 or 4.19.0.1, which fixes this issue.
cvelistv5nvd
CVE-2024-29008MEDIUMCVSS 6.4≥ 4.14.0.0, ≤ 4.18.1.0v4.19.0.02024-04-04
CVE-2024-29008 [MEDIUM] CWE-20 CVE-2024-29008: A problem has been identified in the CloudStack additional VM configuration (extraconfig) feature wh A problem has been identified in the CloudStack additional VM configuration (extraconfig) feature which can be misused by anyone who has privilege to deploy a VM instance or configure settings of an already deployed VM instance, to configure additional VM configuration even when the feature is not explicitly enabled by the administrator. In a KVM bas
cvelistv5nvd