Home

Description

Due to multiple time-of-check time-of-use race conditions in the resource count check and increment logic, as well as missing validations, users of the platform are able to exceed the allocation limits configured for their accounts/domains. This can be used by an attacker to degrade the infrastructure's resources and lead to denial of service conditions. Users are recommended to upgrade to Apache CloudStack versions 4.20.3.0 or 4.22.0.1, or later, which fixes this issue.

PUBLISHED Reserved 2025-12-29 | Published 2026-05-08 | Updated 2026-05-08 | Assigner apache




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition

CWE-770 Allocation of Resources Without Limits or Throttling

Product status

Default status
unaffected

4.0.0 (semver)
affected

4.21.0.0 (semver)
affected

Credits

Fernando Oliveira <ferolicar82@gmail.com> reporter

Gustavo Viana <viana.gust@gmail.com> reporter

References

lists.apache.org/thread/n8mt5b7wkpysstb8w7rr9f02kc5cq2xm vendor-advisory

cve.org (CVE-2025-69233)

nvd.nist.gov (CVE-2025-69233)

Download JSON