CVE-2026-25199
Apache · CloudStack
The Proxmox extension for Apache CloudStack allows unauthorized cross-tenant access to virtual machines due to improper validation of the proxmox_vmid setting.
Executive summary
An authorization bypass in the Apache CloudStack Proxmox extension allows non-privileged tenants to gain full control over virtual machines belonging to other accounts.
Vulnerability
The extension fails to restrict or validate the proxmox_vmid instance setting against tenant ownership. An authenticated tenant can predict or modify this value to associate their CloudStack instance with a victim's Proxmox VM, bypassing multi-tenancy isolation.
Business impact
This flaw effectively breaks the isolation between tenants, allowing a malicious user to destroy, stop, or control another organization's infrastructure. The 9.1 CVSS score highlights the severe risk to data integrity and service availability in multi-tenant cloud environments.
Remediation
Immediate Action: Upgrade Apache CloudStack to version 4.22.0.1 to resolve the authorization logic error.
Proactive Monitoring: Review audit logs for unexpected modifications to the proxmox_vmid parameter or unauthorized attempts to manage virtual machines.
Compensating Controls: As a temporary mitigation, update the global configuration parameter user.vm.denied.details to prevent users from editing the proxmox_vmid detail.
Exploitation status
Public Exploit Available: false
Analyst recommendation
The vulnerability poses a critical threat to multi-tenant environments. It is imperative that administrators immediately apply the provided workaround or upgrade to version 4.22.0.1 to maintain security boundaries and prevent unauthorized cross-tenant access.