Home

Description

In Apache CloudStack improper control of generation of code ('Code Injection') vulnerability is found in the following APIs which are accessible only to admins. * quotaTariffCreate * quotaTariffUpdate * createSecondaryStorageSelector * updateSecondaryStorageSelector * updateHost * updateStorage This issue affects Apache CloudStack: from 4.18.0 before 4.20.2, from 4.21.0 before 4.22.0. Users are recommended to upgrade to versions 4.20.2 or 4.22.0, which contain the fix. The fix introduces a new global configuration flag, js.interpretation.enabled, allowing administrators to control the interpretation of JavaScript expressions in these APIs, thereby mitigating the code injection risk.

PUBLISHED Reserved 2025-09-12 | Published 2025-11-27 | Updated 2025-11-27 | Assigner apache

Problem types

CWE-94 Improper Control of Generation of Code ('Code Injection')

Product status

Default status
unaffected

4.18.0 (semver) before 4.20.2
affected

4.21.0 (semver) before 4.22.0
affected

Credits

Tianyi Cheng <chengtianyi@huawei.com> finder

References

www.openwall.com/lists/oss-security/2025/11/27/2

lists.apache.org/thread/kwwsg2j85f1b75o0ht5zbr34d7h66788 vendor-advisory

cve.org (CVE-2025-59302)

nvd.nist.gov (CVE-2025-59302)

Download JSON