Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59302: CWE-94 Improper Control of Generation of Code ('Code Injection') in Apache Software Foundation Apache CloudStack

0
Unknown
VulnerabilityCVE-2025-59302cvecve-2025-59302cwe-94
Published: Thu Nov 27 2025 (11/27/2025, 11:46:25 UTC)
Source: CVE Database V5
Vendor/Project: Apache Software Foundation
Product: Apache CloudStack

Description

In Apache CloudStack improper control of generation of code ('Code Injection') vulnerability is found in the following APIs which are accessible only to admins. * quotaTariffCreate * quotaTariffUpdate * createSecondaryStorageSelector * updateSecondaryStorageSelector * updateHost * updateStorage This issue affects Apache CloudStack: from 4.18.0 before 4.20.2, from 4.21.0 before 4.22.0. Users are recommended to upgrade to versions 4.20.2 or 4.22.0, which contain the fix. The fix introduces a new global configuration flag, js.interpretation.enabled, allowing administrators to control the interpretation of JavaScript expressions in these APIs, thereby mitigating the code injection risk.

AI-Powered Analysis

AILast updated: 11/27/2025, 12:11:35 UTC

Technical Analysis

CVE-2025-59302 is a vulnerability classified under CWE-94 (Improper Control of Generation of Code) found in Apache CloudStack, an open-source cloud computing software platform. The vulnerability affects several administrative APIs—quotaTariffCreate, quotaTariffUpdate, createSecondaryStorageSelector, updateSecondaryStorageSelector, updateHost, and updateStorage—that improperly handle JavaScript expressions. These APIs allow administrators to manage quota tariffs, secondary storage selectors, hosts, and storage configurations. Due to insufficient validation and control over JavaScript code execution, an attacker with administrative access could inject and execute arbitrary code within the CloudStack management server context. This could lead to unauthorized actions, data manipulation, or disruption of cloud services. The affected versions include 4.18.0 up to but not including 4.20.2, and 4.21.0 up to but not including 4.22.0. The Apache Software Foundation addressed the issue by introducing a global configuration flag named js.interpretation.enabled, which enables administrators to disable JavaScript interpretation in these APIs, effectively mitigating the risk of code injection. Users are strongly advised to upgrade to fixed versions 4.20.2 or 4.22.0. No CVSS score has been assigned yet, and no known exploits have been reported in the wild as of the publication date.

Potential Impact

For European organizations, this vulnerability poses a significant risk primarily to cloud service providers and enterprises relying on Apache CloudStack for private or public cloud infrastructure management. Exploitation could allow an attacker with admin privileges to execute arbitrary code, potentially leading to full compromise of the cloud management platform. This could result in unauthorized access to tenant data, disruption of cloud services, manipulation of resource allocations, or deployment of malicious workloads. The impact on confidentiality, integrity, and availability is high, especially in multi-tenant environments common in European data centers. Given the administrative access requirement, the threat is mitigated somewhat by internal access controls, but insider threats or compromised admin credentials could lead to severe consequences. Additionally, disruption of cloud services could affect critical sectors such as finance, healthcare, and government services prevalent in Europe. The lack of known exploits in the wild reduces immediate risk but does not diminish the urgency of patching due to the potential severity of exploitation.

Mitigation Recommendations

European organizations should take the following specific actions: 1) Immediately identify and inventory all Apache CloudStack deployments and verify their versions. 2) Upgrade all affected CloudStack instances to versions 4.20.2 or 4.22.0 where the vulnerability is patched. 3) If upgrading is not immediately feasible, disable JavaScript interpretation in the affected APIs by setting the global configuration flag js.interpretation.enabled to false. 4) Restrict administrative access to CloudStack management interfaces using strong authentication methods such as multi-factor authentication and network segmentation. 5) Monitor administrative API usage logs for unusual or unauthorized activity indicative of exploitation attempts. 6) Conduct regular security audits and penetration tests focusing on cloud management platforms. 7) Educate administrators about the risks of code injection and the importance of secure API usage. 8) Implement strict credential management policies to prevent compromise of admin accounts. These measures go beyond generic advice by focusing on configuration controls, access restrictions, and proactive monitoring tailored to the CloudStack environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
apache
Date Reserved
2025-09-12T02:34:41.709Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69283d66e4a84287b53ab817

Added to database: 11/27/2025, 12:00:38 PM

Last enriched: 11/27/2025, 12:11:35 PM

Last updated: 11/27/2025, 1:27:47 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats