In Apache CloudStack, a gap in access control checks affected the APIs - createNetworkACL - listNetworkACLs - listResourceDetails - listVirtualMachinesUsageHistory - listVolumesUsageHistory While these APIs were accessible only to authorized users, insufficient permission validation meant that users could occasionally access information beyond their intended scope. Users are recommended to upgrade to Apache CloudStack 4.20.2.0 or 4.22.0.0, which fixes the issue.
History

Fri, 28 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 27 Nov 2025 16:30:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache cloudstack
Vendors & Products Apache
Apache cloudstack

Thu, 27 Nov 2025 13:30:00 +0000

Type Values Removed Values Added
References

Thu, 27 Nov 2025 11:45:00 +0000

Type Values Removed Values Added
Description In Apache CloudStack, a gap in access control checks affected the APIs - createNetworkACL - listNetworkACLs - listResourceDetails - listVirtualMachinesUsageHistory - listVolumesUsageHistory While these APIs were accessible only to authorized users, insufficient permission validation meant that users could occasionally access information beyond their intended scope. Users are recommended to upgrade to Apache CloudStack 4.20.2.0 or 4.22.0.0, which fixes the issue.
Title Apache CloudStack: Lack of user permission validation leading to data leak for few APIs
Weaknesses CWE-200
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2025-11-27T11:40:40.043Z

Updated: 2025-11-28T15:41:44.599Z

Reserved: 2025-09-16T05:22:52.960Z

Link: CVE-2025-59454

cve-icon Vulnrichment

Updated: 2025-11-27T12:07:34.176Z

cve-icon NVD

Status : Received

Published: 2025-11-27T12:15:47.550

Modified: 2025-11-28T16:15:53.743

Link: CVE-2025-59454

cve-icon Redhat

No data.