We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-22829

Apache CloudStack: Unauthorised access to dedicated resources in Quota plugin



Description

The CloudStack Quota plugin has an improper privilege management logic in version 4.20.0.0. Anyone with authenticated user-account access in CloudStack 4.20.0.0 environments, where this plugin is enabled and have access to specific APIs can enable or disable reception of quota-related emails for any account in the environment and list their configurations. Quota plugin users using CloudStack 4.20.0.0 are recommended to upgrade to CloudStack version 4.20.1.0, which fixes this issue.

Reserved 2025-01-07 | Published 2025-06-10 | Updated 2025-06-11 | Assigner apache


LOW: 2.3CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/S:N/AU:N/R:U/V:D/RE:L/U:Amber

Problem types

CWE-269: Improper Privilege Management

Product status

Default status
unaffected

4.20.0.0 before 4.20.1.0
affected

Credits

Fabricio Duarte <fabricio.duarte.jr@gmail.com> finder

References

cloudstack.staged.apache.org/...advisories-4.19.3.0-4.20.1.0 vendor-advisory

www.shapeblue.com/...ecurity-releases-4-19-3-0-and-4-20-1-0/ third-party-advisory

lists.apache.org/thread/y3qnwn59t8qggtdohv7k7vw39bgb3d60 mailing-list

cve.org (CVE-2025-22829)

nvd.nist.gov (CVE-2025-22829)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-22829

Support options

Helpdesk Chat, Email, Knowledgebase