The CloudStack Quota plugin has an improper privilege management logic in version 4.20.0.0. Anyone with authenticated user-account access in CloudStack 4.20.0.0 environments, where this plugin is enabled and have access to specific APIs can enable or disable reception of quota-related emails for any account in the environment and list their configurations. Quota plugin users using CloudStack 4.20.0.0 are recommended to upgrade to CloudStack version 4.20.1.0, which fixes this issue.
History

Wed, 25 Jun 2025 20:00:00 +0000

Type Values Removed Values Added
First Time appeared Apache
Apache cloudstack
CPEs cpe:2.3:a:apache:cloudstack:4.20.0.0:*:*:*:*:*:*:*
Vendors & Products Apache
Apache cloudstack
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Wed, 11 Jun 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 10 Jun 2025 23:15:00 +0000

Type Values Removed Values Added
Description The CloudStack Quota plugin has an improper privilege management logic in version 4.20.0.0. Anyone with authenticated user-account access in CloudStack 4.20.0.0 environments, where this plugin is enabled and have access to specific APIs can enable or disable reception of quota-related emails for any account in the environment and list their configurations. Quota plugin users using CloudStack 4.20.0.0 are recommended to upgrade to CloudStack version 4.20.1.0, which fixes this issue.
Title Apache CloudStack: Unauthorised access to dedicated resources in Quota plugin
Weaknesses CWE-269
References
Metrics cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/S:N/AU:N/R:U/V:D/RE:L/U:Amber'}


cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-06-11T13:53:45.517Z

Reserved: 2025-01-07T23:23:17.658Z

Link: CVE-2025-22829

cve-icon Vulnrichment

Updated: 2025-06-11T13:53:42.381Z

cve-icon NVD

Status : Analyzed

Published: 2025-06-10T23:15:22.740

Modified: 2025-06-25T19:38:05.817

Link: CVE-2025-22829

cve-icon Redhat

No data.