CVE-2025-22829
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-10

Last updated on: 2025-06-25

Assigner: Apache Software Foundation

Description
The CloudStack Quota plugin has an improper privilege management logic in version 4.20.0.0. Anyone with authenticated user-account access in CloudStack 4.20.0.0 environments, where this plugin is enabled and have access to specific APIs can enable or disable reception of quota-related emails for any account in the environment and list their configurations. Quota plugin users using CloudStack 4.20.0.0 are recommended to upgrade to CloudStack version 4.20.1.0, which fixes this issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-10
Last Modified
2025-06-25
Generated
2026-05-07
AI Q&A
2025-06-11
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
apache cloudstack 4.20.0.0
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the CloudStack Quota plugin version 4.20.0.0 involves improper privilege management. Authenticated users with access to specific APIs can enable or disable quota-related email notifications for any account in the environment and can also list quota configurations, actions they should not normally be authorized to perform.


How can this vulnerability impact me? :

The vulnerability allows authenticated users to manipulate quota-related email notifications and view quota configurations for any account, potentially leading to unauthorized information disclosure and disruption of quota notification processes within the CloudStack environment.


What immediate steps should I take to mitigate this vulnerability?

Upgrade CloudStack from version 4.20.0.0 to version 4.20.1.0, which contains the fix for this vulnerability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart