CVE-2025-47713
BaseFortify
Publication date: 2025-06-10
Last updated on: 2025-07-01
Assigner: Apache Software Foundation
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| apache | cloudstack | From 4.10.0.0 (inc) to 4.19.3.0 (exc) |
| apache | cloudstack | From 4.20.0.0 (inc) to 4.20.1.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-269 | The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a privilege escalation issue in Apache CloudStack versions 4.10.0.0 through 4.20.0.0. A malicious Domain Admin user in the ROOT domain can reset the passwords of user accounts with the Admin role type without proper restrictions. This allows the attacker to take control of higher-privileged user accounts, impersonate Admin users, and gain access to sensitive APIs and resources.
How can this vulnerability impact me? :
The vulnerability can lead to an attacker gaining unauthorized control over high-privilege user accounts, which may result in compromise of resource integrity and confidentiality, data loss, denial of service, and disruption of the availability of infrastructure managed by CloudStack.
What immediate steps should I take to mitigate this vulnerability?
Users are recommended to upgrade Apache CloudStack to version 4.19.3.0 or 4.20.1.0, which include fixes such as strict validation on Role Type hierarchy, API privilege comparison, and new domain-level settings to restrict operations on accounts of the same role type. These steps mitigate the privilege escalation vulnerability by ensuring that only authorized users can reset passwords or perform operations on higher-privileged accounts.