Home

Description

Account users are allowed by default to register templates to be downloaded directly to the primary storage for deploying instances using the KVM hypervisor. Due to missing file name sanitization, an attacker can register malicious templates to execute arbitrary code on the KVM hosts. This can result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of the KVM-based infrastructure managed by CloudStack. Users are recommended to upgrade to Apache CloudStack versions 4.20.3.0 or 4.22.0.1, or later, which fixes this issue.

PUBLISHED Reserved 2026-01-28 | Published 2026-05-08 | Updated 2026-05-08 | Assigner apache

Problem types

CWE-94 Improper Control of Generation of Code ('Code Injection')

Product status

Default status
unaffected

4.11.0 (semver)
affected

4.21.0.0 (semver)
affected

Credits

Reza at HazardLab (https://hazardlab.ninja) reporter

References

lists.apache.org/thread/n8mt5b7wkpysstb8w7rr9f02kc5cq2xm vendor-advisory

cve.org (CVE-2026-25077)

nvd.nist.gov (CVE-2026-25077)

Download JSON