- Description
- In Apache CloudStack, a gap in access control checks affected the APIs - createNetworkACL - listNetworkACLs - listResourceDetails - listVirtualMachinesUsageHistory - listVolumesUsageHistory While these APIs were accessible only to authorized users, insufficient permission validation meant that users could occasionally access information beyond their intended scope. Users are recommended to upgrade to Apache CloudStack 4.20.2.0 or 4.22.0.0, which fixes the issue.
- Source
- security@apache.org
- NVD status
- Analyzed
- Products
- cloudstack
CVSS 3.1
- Type
- Secondary
- Base score
- 4.3
- Impact score
- 1.4
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
- Severity
- MEDIUM
- security@apache.org
- CWE-200
- Hype score
- Not currently trending
CVE-2025-59302: Apache CloudStack: Potential remote code execution on Javascript engine defined rules https://t.co/5OZi6kaAA8 CVE-2025-59454: Apache CloudStack: Lack of user permission validation leading to data leak for few APIs https://t.co/lBwgQ52Cx4
@oss_security
4 Dec 2025
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-59454 In Apache CloudStack, a gap in access control checks affected the APIs - createNetworkACL - listNetworkACLs - listResourceDetails - listVirtualMachinesUsageHistory - … https://t.co/uHvbXjoiZm
@CVEnew
27 Nov 2025
300 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2025-59454 CVE-2025-59454 https://t.co/gvrZrsVFfZ
@VulmonFeeds
27 Nov 2025
39 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:*",
"matchCriteriaId": "740D231F-5A6F-44FD-9CC8-246BF3BDA73F",
"versionEndExcluding": "4.20.2.0",
"versionStartIncluding": "4.0.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:apache:cloudstack:4.21.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "8D19C2F1-2730-4EAE-A7CF-950F185B76FC",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]