In Apache CloudStack improper control of generation of code ('Code Injection') vulnerability is found in the following APIs which are accessible only to admins. * quotaTariffCreate * quotaTariffUpdate * createSecondaryStorageSelector * updateSecondaryStorageSelector * updateHost * updateStorage This issue affects Apache CloudStack: from 4.18.0 before 4.20.2, from 4.21.0 before 4.22.0. Users are recommended to upgrade to versions 4.20.2 or 4.22.0, which contain the fix. The fix introduces a new global configuration flag, js.interpretation.enabled, allowing administrators to control the interpretation of JavaScript expressions in these APIs, thereby mitigating the code injection risk.
History

Fri, 28 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.7, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 28 Nov 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache cloudstack
Vendors & Products Apache
Apache cloudstack

Thu, 27 Nov 2025 13:30:00 +0000

Type Values Removed Values Added
References

Thu, 27 Nov 2025 12:00:00 +0000

Type Values Removed Values Added
Description In Apache CloudStack improper control of generation of code ('Code Injection') vulnerability is found in the following APIs which are accessible only to admins. * quotaTariffCreate * quotaTariffUpdate * createSecondaryStorageSelector * updateSecondaryStorageSelector * updateHost * updateStorage This issue affects Apache CloudStack: from 4.18.0 before 4.20.2, from 4.21.0 before 4.22.0. Users are recommended to upgrade to versions 4.20.2 or 4.22.0, which contain the fix. The fix introduces a new global configuration flag, js.interpretation.enabled, allowing administrators to control the interpretation of JavaScript expressions in these APIs, thereby mitigating the code injection risk.
Title Apache CloudStack: Potential remote code execution on Javascript engine defined rules
Weaknesses CWE-94
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2025-11-27T11:46:25.521Z

Updated: 2025-11-28T14:59:47.155Z

Reserved: 2025-09-12T02:34:41.709Z

Link: CVE-2025-59302

cve-icon Vulnrichment

Updated: 2025-11-27T12:07:30.768Z

cve-icon NVD

Status : Received

Published: 2025-11-27T12:15:47.410

Modified: 2025-11-28T15:16:02.757

Link: CVE-2025-59302

cve-icon Redhat

No data.