CVE-2025-30675
BaseFortify
Publication date: 2025-06-11
Last updated on: 2025-07-01
Assigner: Apache Software Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apache | cloudstack | From 4.0.0 (inc) to 4.19.3.0 (exc) |
| apache | cloudstack | From 4.20.0.0 (inc) to 4.20.1.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-200 | The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability in Apache CloudStack involves an access control flaw in the listTemplates and listIsos APIs. A malicious Domain Admin or Resource Admin can exploit it by specifying the 'domainid' parameter along with 'filter=self' or 'filter=selfexecutable', which allows them to gain unauthorized visibility into templates and ISOs belonging to the ROOT domain. Essentially, this flaw lets attackers see and extract metadata from templates and ISOs outside their authorized domains, breaking domain isolation and potentially exposing sensitive or internal configuration information. [1]
How can this vulnerability impact me? :
If exploited, this vulnerability can allow a malicious admin to access and enumerate templates and ISOs from unrelated domains, violating domain isolation boundaries. This unauthorized access can lead to exposure of sensitive or internal configuration details, which could be used for further attacks or to compromise system security. [1]
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should upgrade your Apache CloudStack installation to version 4.19.3.0 or 4.20.1.0, as these versions include the fix that enforces strict domain resolution to prevent unauthorized access to templates and ISOs outside the caller's domain scope. [1]