Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
82 changes: 82 additions & 0 deletions blog/2025-11-27-advisory-release-4.20.2.0-4.22.0.0/index.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,82 @@
---
layout: post
title: "[ADVISORY] Security Improvements in Apache CloudStack 4.20.2.0 and 4.22.0.0"
tags: [announcement]
authors: [harikrishna]
slug: cve-advisories-4.20.2.0-4.22.0.0
---

[![](banner.jpg "Security Improvements in Apache CloudStack 4.20.2.0 and 4.22.0.0")](/blog/lts-release-advisory-4.20.2.0-4.22.0.0)

The Apache CloudStack project announces the LTS release of [4.20.2.0](https://github.com/apache/cloudstack/releases/tag/4.20.2.0) and [4.22.0.0](https://github.com/apache/cloudstack/releases/tag/4.22.0.0) that address the following security issues:

- CVE-2025-59302 (severity 'Low')
- CVE-2025-59454 (severity 'Low')

<!-- truncate -->

## [CVE-2025-59302](https://www.cve.org/CVERecord?id=CVE-2025-59302): Potential remote code execution on Javascript engine defined rules

In Apache CloudStack, improper control of generation of code ('Code Injection') vulnerability is found in the following APIs which are accessible only to admins.

- quotaTariffCreate
- quotaTariffUpdate
- createSecondaryStorageSelector
- updateSecondaryStorageSelector
- updateHost
- updateStorage

The fix introduces a new global configuration flag, js.interpretation.enabled, allowing administrators to control the interpretation of JavaScript expressions in these APIs, thereby mitigating the code injection risk.

## [CVE-2025-59454](https://www.cve.org/CVERecord?id=CVE-2025-59454): Lack of user permission validation leading to data leak for few APIs

In Apache CloudStack, a gap in access control checks affected the APIs

- createNetworkACL
- listNetworkACLs
- listResourceDetails
- listVirtualMachinesUsageHistory
- listVolumesUsageHistory

While these APIs were accessible only to authorized users, insufficient permission validation meant that users could occasionally access information beyond their intended scope.

## Credits

The CVEs are credited to the following reporters:

- CVE-2025-59302:
- Tianyi Cheng <chengtianyi@huawei.com>

- CVE-2025-59454:
- bugreporter@qq.com <https://github.com/ai-bugreporter/Credits>

## Affected versions:

- CVE-2025-59302:
- Apache CloudStack 4.18.0.0 through 4.20.1.0 and 4.21.0.0

- CVE-2025-59454:
- Apache CloudStack 4.0.0 through 4.20.1.0 and 4.21.0.0

## Resolution

Users are recommended to upgrade to version 4.20.2.0, 4.22.0.0 or later, which addresses these issues.

## Downloads and Documentation

The official source code for the 4.20.2.0 and 4.22.0.0 releases can be downloaded from the project [downloads page](/downloads).

The 4.20.2.0 and 4.22.0.0 release notes can be found at:

- https://docs.cloudstack.apache.org/en/4.20.2.0/releasenotes/about.html
- https://docs.cloudstack.apache.org/en/4.22.0.0/releasenotes/about.html

In addition to the official source code release, individual contributors have also made release packages available on the Apache CloudStack download page, and available at:

- https://download.cloudstack.org/el/8/
- https://download.cloudstack.org/el/9/
- https://download.cloudstack.org/el/10/
- https://download.cloudstack.org/suse/15/
- https://download.cloudstack.org/ubuntu/dists/
- https://download.cloudstack.org/debian/dists/
- https://www.shapeblue.com/cloudstack-packages/