In Apache CloudStack, a gap in access control checks affected the APIs - createNetworkACL
- listNetworkACLs
- listResourceDetails
- listVirtualMachinesUsageHistory
- listVolumesUsageHistory

While these APIs were accessible only to authorized users, insufficient permission validation meant that users could occasionally access information beyond their intended scope.




Users are recommended to upgrade to Apache CloudStack 4.20.2.0 or 4.22.0.0, which fixes the issue.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 27 Nov 2025 13:30:00 +0000

Type Values Removed Values Added
References

Thu, 27 Nov 2025 11:45:00 +0000

Type Values Removed Values Added
Description In Apache CloudStack, a gap in access control checks affected the APIs - createNetworkACL - listNetworkACLs - listResourceDetails - listVirtualMachinesUsageHistory - listVolumesUsageHistory While these APIs were accessible only to authorized users, insufficient permission validation meant that users could occasionally access information beyond their intended scope. Users are recommended to upgrade to Apache CloudStack 4.20.2.0 or 4.22.0.0, which fixes the issue.
Title Apache CloudStack: Lack of user permission validation leading to data leak for few APIs
Weaknesses CWE-200
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-11-27T12:07:34.176Z

Reserved: 2025-09-16T05:22:52.960Z

Link: CVE-2025-59454

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-11-27T12:15:47.550

Modified: 2025-11-27T13:15:59.810

Link: CVE-2025-59454

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.