CVE-2025-47849
- EPSS 0.06%
- Published 10.06.2025 23:15:58
- Last modified 01.07.2025 20:13:33
A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can get the API key and secret key of user-accounts of Admin role type in the same domain. This...
CVE-2025-47713
- EPSS 0.06%
- Published 10.06.2025 23:15:58
- Last modified 01.07.2025 20:13:19
A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can reset the password of user-accounts of Admin role type. This operation is not appropriately...
CVE-2025-26521
- EPSS 0.06%
- Published 10.06.2025 23:15:23
- Last modified 01.07.2025 19:25:25
When an Apache CloudStack user-account creates a CKS-based Kubernetes cluster in a project, the API key and the secret key of the 'kubeadmin' user of the caller account are used to create the secret config in the CKS-based Kubernetes cluster. A membe...
CVE-2025-22829
- EPSS 0.1%
- Published 10.06.2025 23:15:22
- Last modified 25.06.2025 19:38:05
The CloudStack Quota plugin has an improper privilege management logic in version 4.20.0.0. Anyone with authenticated user-account access in CloudStack 4.20.0.0 environments, where this plugin is enabled and have access to specific APIs can enable or...
CVE-2025-30675
- EPSS 0.1%
- Published 10.06.2025 23:12:23
- Last modified 01.07.2025 20:14:05
In Apache CloudStack, a flaw in access control affects the listTemplates and listIsos APIs. A malicious Domain Admin or Resource Admin can exploit this issue by intentionally specifying the 'domainid' parameter along with the 'filter=self' or 'filter...
CVE-2025-22828
- EPSS 13.01%
- Published 13.01.2025 13:16:12
- Last modified 01.07.2025 19:20:38
CloudStack users can add and read comments (annotations) on resources they are authorised to access. Due to an access validation issue that affects Apache CloudStack versions from 4.16.0, users who have access, prior access or knowledge of resource...
CVE-2024-50386
- EPSS 1.27%
- Published 12.11.2024 15:15:10
- Last modified 04.02.2025 18:23:49
Account users in Apache CloudStack by default are allowed to register templates to be downloaded directly to the primary storage for deploying instances. Due to missing validation checks for KVM-compatible templates in CloudStack 4.0.0 through 4.18.2...
CVE-2024-45693
- EPSS 0.06%
- Published 16.10.2024 08:15:06
- Last modified 21.11.2024 09:37:59
Users logged into the Apache CloudStack's web interface can be tricked to submit malicious CSRF requests due to missing validation of the origin of the requests. This can allow an attacker to gain privileges and access to resources of the authenticat...
CVE-2024-45462
- EPSS 0.05%
- Published 16.10.2024 08:15:05
- Last modified 21.11.2024 09:37:48
The logout operation in the CloudStack web interface does not expire the user session completely which is valid until expiry by time or restart of the backend service. An attacker that has access to a user's browser can use an unexpired session to ga...
CVE-2024-45219
- EPSS 1.27%
- Published 16.10.2024 08:15:05
- Last modified 01.07.2025 20:28:53
Account users in Apache CloudStack by default are allowed to upload and register templates for deploying instances and volumes for attaching them as data disks to their existing instances. Due to missing validation checks for KVM-compatible templates...