Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-25199— Apache CloudStack: Proxmox Extension Allows Unauthorized Cross-Tenant Instance Access

Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-25199

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Apache CloudStack: Proxmox Extension Allows Unauthorized Cross-Tenant Instance Access
Source: NVD (National Vulnerability Database)
Vulnerability Description
Instances deployed via the Proxmox extension allow unauthorized access to instances belonging to other tenants. This issue affects Apache CloudStack: from 4.21.0.0 through 4.22.0.0. The Proxmox extension for CloudStack improperly uses a user-editable instance setting, proxmox_vmid, to associate CloudStack instances with Proxmox virtual machines. Because this value is not restricted or validated against tenant ownership and Proxmox VM IDs are predictable, a non-privileged attacker can modify the setting to reference a VM belonging to another account. This allows unauthorized cross-tenant access and enables full control over the targeted VM, including starting, stopping, and destroying the virtual machine. Users are recommended to upgrade to version 4.22.0.1, which fixes this issue. As a workaround for the existing installations, editing of the proxmox_vmid instance detail by users can be prevented by adding this detail name to the global configuration parameter - user.vm.denied.details.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
信息暴露
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache CloudStack 4.21.0 ~ 4.22.0 -

II. Public POCs for CVE-2026-25199

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-25199

Please Login to view more intelligence information

Same Patch Batch · Apache Software Foundation · 2026-05-08 · 8 CVEs total

CVE-2025-664678.0 HIGHApache CloudStack: MinIO policy remains intact on bucket deletion
CVE-2025-692336.5 MEDIUMApache CloudStack: Domain/account resources limits not honored
CVE-2026-39816Apache NiFi: Missing Execute Code Required Permission on TinkerpopClientService
CVE-2026-25077Apache CloudStack: Unauthenticated Command Injection in Direct Download Templates
CVE-2025-66172Apache CloudStack: Any user can attach a volume in their VMs from backups they should not
CVE-2025-66171Apache CloudStack: Any user can create a new VM from backups they should not have access t
CVE-2025-66170Apache CloudStack: Any user can list backups that they should not have access to

IV. Related Vulnerabilities

V. Comments for CVE-2026-25199

No comments yet


Leave a comment