Severity: low 

Affected versions:

- Apache CloudStack 4.18.0 before 4.20.2
- Apache CloudStack 4.21.0 before 4.22.0

Description:

In  Apache CloudStack improper control of generation of code ('Code Injection') 
vulnerability is found in the following APIs which are accessible only to 
admins.

  *  quotaTariffCreate
  *  quotaTariffUpdate
  *  createSecondaryStorageSelector
  *  updateSecondaryStorageSelector
  *  updateHost
  *  updateStorage


This issue affects Apache CloudStack: from 4.18.0 before 4.20.2, from 4.21.0 
before 4.22.0. Users are recommended to upgrade to versions 4.20.2 or 4.22.0, 
which contain the fix.

The fix introduces a new global configuration flag, js.interpretation.enabled, 
allowing administrators to control the interpretation of JavaScript expressions 
in these APIs, thereby mitigating the code injection risk.

Credit:

Tianyi Cheng <[email protected]> (finder)

References:

https://cloudstack.apache.org/
https://www.cve.org/CVERecord?id=CVE-2025-59302

Reply via email to