{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-59302","assignerOrgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","state":"PUBLISHED","assignerShortName":"apache","dateReserved":"2025-09-12T02:34:41.709Z","datePublished":"2025-11-27T11:46:25.521Z","dateUpdated":"2026-02-26T16:07:27.738Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Apache CloudStack","vendor":"Apache Software Foundation","versions":[{"lessThan":"4.20.2","status":"affected","version":"4.18.0","versionType":"semver"},{"lessThan":"4.22.0","status":"affected","version":"4.21.0","versionType":"semver"}]}],"credits":[{"lang":"en","type":"finder","value":"Tianyi Cheng <chengtianyi@huawei.com>"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>In  Apache CloudStack improper control of generation of code ('Code Injection') vulnerability is found in the following APIs which are accessible only to admins.</p><ul><li>quotaTariffCreate</li><li>quotaTariffUpdate</li><li>createSecondaryStorageSelector</li><li>updateSecondaryStorageSelector</li><li>updateHost</li><li>updateStorage</li></ul><p>This issue affects Apache CloudStack: from 4.18.0 before 4.20.2, from 4.21.0 before 4.22.0.&nbsp;Users are recommended to upgrade to versions 4.20.2 or 4.22.0, which contain the fix.</p><p>The fix introduces a new global configuration flag, <strong><code>js.interpretation.enabled</code></strong>, allowing administrators to control the interpretation of JavaScript expressions in these APIs, thereby mitigating the code injection risk.</p>"}],"value":"In  Apache CloudStack improper control of generation of code ('Code Injection') vulnerability is found in the following APIs which are accessible only to admins.\n\n  *  quotaTariffCreate\n  *  quotaTariffUpdate\n  *  createSecondaryStorageSelector\n  *  updateSecondaryStorageSelector\n  *  updateHost\n  *  updateStorage\n\n\nThis issue affects Apache CloudStack: from 4.18.0 before 4.20.2, from 4.21.0 before 4.22.0. Users are recommended to upgrade to versions 4.20.2 or 4.22.0, which contain the fix.\n\nThe fix introduces a new global configuration flag, js.interpretation.enabled, allowing administrators to control the interpretation of JavaScript expressions in these APIs, thereby mitigating the code injection risk."}],"metrics":[{"other":{"content":{"text":"low"},"type":"Textual description of severity"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-94","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"f0158376-9dc2-43b6-827c-5f631a4d8d09","shortName":"apache","dateUpdated":"2025-11-27T11:46:25.521Z"},"references":[{"tags":["vendor-advisory"],"url":"https://lists.apache.org/thread/kwwsg2j85f1b75o0ht5zbr34d7h66788"}],"source":{"discovery":"UNKNOWN"},"title":"Apache CloudStack: Potential remote code execution on Javascript engine defined rules","x_generator":{"engine":"Vulnogram 0.2.0"}},"adp":[{"title":"CVE Program Container","references":[{"url":"http://www.openwall.com/lists/oss-security/2025/11/27/2"}],"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2025-11-27T12:07:30.768Z"}},{"metrics":[{"cvssV3_1":{"scope":"UNCHANGED","version":"3.1","baseScore":4.7,"attackVector":"NETWORK","baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L","integrityImpact":"LOW","userInteraction":"NONE","attackComplexity":"LOW","availabilityImpact":"LOW","privilegesRequired":"HIGH","confidentialityImpact":"LOW"}},{"other":{"type":"ssvc","content":{"id":"CVE-2025-59302","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2025-12-02T04:56:00.679228Z"}}}],"problemTypes":[{"descriptions":[{"lang":"en","type":"CWE","cweId":"CWE-94","description":"CWE-94 Improper Control of Generation of Code ('Code Injection')"}]}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-26T16:07:27.738Z"}}]}}