Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-47849: CWE-269 Improper Privilege Management in Apache Software Foundation Apache CloudStack

0
High
VulnerabilityCVE-2025-47849cvecve-2025-47849cwe-269
Published: Tue Jun 10 2025 (06/10/2025, 23:07:54 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache CloudStack

Description

A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can get the API key and secret key of user-accounts of Admin role type in the same domain. This operation is not appropriately restricted and allows the attacker to assume control over higher-privileged user-accounts. A malicious Domain Admin attacker can impersonate an Admin user-account and gain access to sensitive APIs and resources that could result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of infrastructure managed by CloudStack. Users are recommended to upgrade to Apache CloudStack 4.19.3.0 or 4.20.1.0, which fixes the issue with the following: * Strict validation on Role Type hierarchy: the caller's role must be equal to or higher than the target user's role.  * API privilege comparison: the caller must possess all privileges of the user they are operating on.  * Two new domain-level settings (restricted to the default admin):   - role.types.allowed.for.operations.on.accounts.of.same.role.type: Defines which role types are allowed to act on users of the same role type. Default: "Admin, DomainAdmin, ResourceAdmin".   - allow.operations.on.users.in.same.account: Allows/disallows user operations within the same account. Default: true.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 02:46:38 UTC

Technical Analysis

CVE-2025-47849 is a critical privilege escalation vulnerability affecting Apache CloudStack versions 4.10.0.0 through 4.20.0.0. The vulnerability arises from improper privilege management (CWE-269) where a Domain Admin user in the ROOT domain can retrieve API keys and secret keys of Admin role users within the same domain. This occurs because the system does not properly restrict operations based on role hierarchy or privilege equivalence, allowing a lower-privileged Domain Admin to assume the identity and privileges of higher-level Admin users. This unauthorized access enables the attacker to invoke sensitive APIs and manipulate cloud resources, potentially compromising the confidentiality and integrity of data, causing data loss, and impacting the availability of cloud infrastructure managed by CloudStack. The flaw is due to insufficient validation of the caller's role relative to the target user's role and inadequate privilege checks. Apache addressed the issue by implementing strict validation ensuring the caller's role is equal or higher than the target user's role, requiring the caller to possess all privileges of the target user, and introducing two new domain-level configuration settings to restrict operations on users of the same role type and within the same account. These mitigations are included in Apache CloudStack versions 4.19.3.0 and 4.20.1.0. The vulnerability has a CVSS v3.1 score of 8.8 (high severity), reflecting its network exploitability, low attack complexity, and significant impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the potential for damage is substantial given the elevated privileges that can be gained.

Potential Impact

The impact of CVE-2025-47849 is significant for organizations using Apache CloudStack in affected versions. Successful exploitation allows a malicious Domain Admin to escalate privileges and impersonate Admin users, gaining unrestricted access to sensitive APIs and cloud resources. This can lead to unauthorized data access, modification, or deletion, resulting in data breaches and loss of data integrity. Additionally, attackers could disrupt cloud services causing denial of service, impacting business continuity and availability of critical infrastructure. The compromise of API keys and secret keys also increases the risk of lateral movement within the cloud environment and persistent unauthorized access. Organizations relying on CloudStack for managing multi-tenant cloud infrastructure face elevated risks of insider threats and privilege abuse. The vulnerability undermines trust in role-based access controls and could facilitate further attacks on cloud environments, affecting confidentiality, integrity, and availability of managed resources.

Mitigation Recommendations

To mitigate CVE-2025-47849, organizations should immediately upgrade Apache CloudStack to versions 4.19.3.0 or 4.20.1.0, which contain the necessary security fixes. Beyond upgrading, administrators should audit and restrict Domain Admin privileges, minimizing the number of users with such roles. Implement strict role separation policies and monitor API key usage for anomalies. Configure the new domain-level settings introduced by Apache to limit operations on accounts of the same role type and within the same account, reducing the attack surface. Regularly review and enforce the principle of least privilege for all user roles. Employ comprehensive logging and alerting on privilege escalation attempts and API key access. Conduct penetration testing and security assessments focused on role-based access controls within CloudStack environments. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential compromises.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
apache
Date Reserved
2025-05-12T08:45:45.595Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6848bbe13cd93dcca83127ae

Added to database: 6/10/2025, 11:12:33 PM

Last enriched: 2/27/2026, 2:46:38 AM

Last updated: 3/26/2026, 8:40:05 AM

Views: 84

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses