Risk | Low |
Patch available | NO |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2025-22828 |
CWE-ID | CWE-284 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
Apache CloudStack Server applications / Other server solutions |
Vendor | Apache Foundation |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU105110
Risk: Low
CVSSv4.0: 1.3 [CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2025-22828
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a remote user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A remote user can guess resource UUIDs and read annotations on resources they are not allowed to access.
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.
As a temporary solution the vendor recommends disabling listAnnotations and addAnnotation API access to non-admin roles.
Vulnerable software versionsApache CloudStack: 4.16.0.0 - 4.20.0.0
CPE2.3https://www.openwall.com/lists/oss-security/2025/01/13/1
https://lists.apache.org/thread/bbsm9fdwrgfyostzojh6ghpocgdmx8rs
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.