Account users are allowed by default to register templates to be downloaded directly to the primary storage for deploying instances using the KVM hypervisor. Due to missing file name sanitization, an attacker can register malicious templates to execute arbitrary code on the KVM hosts. This can result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of the KVM-based infrastructure managed by CloudStack. Users are recommended to upgrade to Apache CloudStack versions 4.20.3.0 or 4.22.0.1, or later, which fixes this issue.
History

Fri, 08 May 2026 13:00:00 +0000

Type Values Removed Values Added
Description Account users are allowed by default to register templates to be downloaded directly to the primary storage for deploying instances using the KVM hypervisor. Due to missing file name sanitization, an attacker can register malicious templates to execute arbitrary code on the KVM hosts. This can result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of the KVM-based infrastructure managed by CloudStack. Users are recommended to upgrade to Apache CloudStack versions 4.20.3.0 or 4.22.0.1, or later, which fixes this issue.
Title Apache CloudStack: Unauthenticated Command Injection in Direct Download Templates
Weaknesses CWE-94
References

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2026-05-08T12:21:27.034Z

Reserved: 2026-01-28T22:03:17.222Z

Link: CVE-2026-25077

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T13:16:36.133

Modified: 2026-05-08T13:16:36.133

Link: CVE-2026-25077

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.