* quotaTariffCreate
* quotaTariffUpdate
* createSecondaryStorageSelector
* updateSecondaryStorageSelector
* updateHost
* updateStorage
This issue affects Apache CloudStack: from 4.18.0 before 4.20.2, from 4.21.0 before 4.22.0. Users are recommended to upgrade to versions 4.20.2 or 4.22.0, which contain the fix.
The fix introduces a new global configuration flag, js.interpretation.enabled, allowing administrators to control the interpretation of JavaScript expressions in these APIs, thereby mitigating the code injection risk.
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 02 Dec 2025 14:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:cloudstack:*:*:*:*:*:*:*:* cpe:2.3:a:apache:cloudstack:4.21.0.0:*:*:*:*:*:*:* |
Fri, 28 Nov 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Fri, 28 Nov 2025 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Apache
Apache cloudstack |
|
| Vendors & Products |
Apache
Apache cloudstack |
Thu, 27 Nov 2025 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 27 Nov 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Apache CloudStack improper control of generation of code ('Code Injection') vulnerability is found in the following APIs which are accessible only to admins. * quotaTariffCreate * quotaTariffUpdate * createSecondaryStorageSelector * updateSecondaryStorageSelector * updateHost * updateStorage This issue affects Apache CloudStack: from 4.18.0 before 4.20.2, from 4.21.0 before 4.22.0. Users are recommended to upgrade to versions 4.20.2 or 4.22.0, which contain the fix. The fix introduces a new global configuration flag, js.interpretation.enabled, allowing administrators to control the interpretation of JavaScript expressions in these APIs, thereby mitigating the code injection risk. | |
| Title | Apache CloudStack: Potential remote code execution on Javascript engine defined rules | |
| Weaknesses | CWE-94 | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-12-02T04:55:59.611Z
Reserved: 2025-09-12T02:34:41.709Z
Link: CVE-2025-59302
Updated: 2025-11-27T12:07:30.768Z
Status : Analyzed
Published: 2025-11-27T12:15:47.410
Modified: 2025-12-02T14:36:02.567
Link: CVE-2025-59302
No data.
OpenCVE Enrichment
Updated: 2025-11-28T08:51:21Z