πŸ” CVE Alert

CVE-2025-59302

MEDIUM 4.7

Apache CloudStack: Potential remote code execution on Javascript engine defined rules

CVSS Score
4.7
EPSS Score
0.0%
EPSS Percentile
0th

In Apache CloudStack improper control of generation of code ('Code Injection') vulnerability is found in the following APIs which are accessible only to admins. * quotaTariffCreate * quotaTariffUpdate * createSecondaryStorageSelector * updateSecondaryStorageSelector * updateHost * updateStorage This issue affects Apache CloudStack: from 4.18.0 before 4.20.2, from 4.21.0 before 4.22.0.Β Users are recommended to upgrade to versions 4.20.2 or 4.22.0, which contain the fix. The fix introduces a new global configuration flag, js.interpretation.enabled, allowing administrators to control the interpretation of JavaScript expressions in these APIs, thereby mitigating the code injection risk.

CWE CWE-94
Vendor apache software foundation
Product apache cloudstack
Published Nov 27, 2025
Last Updated Feb 26, 2026
Stay Ahead of the Next One

Get instant alerts for apache software foundation apache cloudstack

Be the first to know when new medium vulnerabilities affecting apache software foundation apache cloudstack are published β€” delivered to Slack, Telegram or Discord.

Get Free Alerts β†’ Free Β· No credit card Β· 60 sec setup

Affected Versions

Apache Software Foundation / Apache CloudStack
4.18.0 < 4.20.2 4.21.0 < 4.22.0

References

NVD β†— CVE.org β†— EPSS Data β†—
lists.apache.org: https://lists.apache.org/thread/kwwsg2j85f1b75o0ht5zbr34d7h66788 openwall.com: http://www.openwall.com/lists/oss-security/2025/11/27/2

Credits

Tianyi Cheng <[email protected]>