In Apache CloudStack, a gap in access control checks affected the APIs - createNetworkACL
- listNetworkACLs
- listResourceDetails
- listVirtualMachinesUsageHistory
- listVolumesUsageHistory
While these APIs were accessible only to authorized users, insufficient permission validation meant that users could occasionally access information beyond their intended scope.
Users are recommended to upgrade to Apache CloudStack 4.20.2.0 or 4.22.0.0, which fixes the issue.
References
| Link | Resource |
|---|---|
| https://lists.apache.org/thread/0hlklvlwhzsfw39nocmyxb6svjbs9xbc | Mailing List Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2025/11/27/3 | Mailing List Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-11-27 12:15
Updated : 2025-12-02 14:38
NVD link : CVE-2025-59454
Mitre link : CVE-2025-59454
CVE.ORG link : CVE-2025-59454
JSON object : View
Products Affected
apache
- cloudstack
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
