Apache CloudStack, an open-source cloud infrastructure management platform, has released critical security updates—versions 4.19.3.0 and 4.20.1.0—to address five newly discovered vulnerabilities, including two classified as critical. These flaws, disclosed in a security advisory by PMC member Pearl Dsilva on June 10, 2025, could allow attackers to gain unauthorized access, escalate privileges, and compromise user resources. Notably, CVE-2025-26521 exposes a serious flaw in CKS-based Kubernetes clusters where project members could access the kubeadmin credentials and impersonate cluster creators. Another critical issue, CVE-2025-47713, enables Domain Admins in the ROOT domain to reset passwords for Admin role accounts, risking unauthorized system control. Based on the CVE, these vulnerabilities affect CloudStack versions 4.0.0.0 to 4.20.0.0. The security risks include unauthorized access to APIs, exposure of templates and ISOs, and manipulation of quota configurations. Attackers exploiting these flaws could bypass standard privilege controls, retrieve secret keys, and disrupt infrastructure availability, integrity, and confidentiality. The advisory stresses that systems running versions older than 4.20.0.0 are particularly vulnerable and should not delay patching. The security implications are far-reaching, especially for organizations relying on multi-tenant cloud environments with shared administrative access. The updates enforce stricter role-based access controls, implement privilege validation, and introduce domain-level settings to limit sensitive operations. For CKS environments, it is advised to regenerate credentials, replace Kubernetes secrets, and use dedicated service accounts. Following these best practices will help organizations safeguard against credential theft, privilege abuse, and potential full-system compromises in production environments.
A TOCTOU (time-of-check/time-of-use) race condition in the Windows Cloud Files minifilter driver (cldflt.sys), tracked as CVE-2025-55680, permits local authenticated users to creat...
The Jenkins project has released a major security advisory disclosing 14 vulnerabilities across multiple plugins, including several rated high severity. The most critical, CVE-2025...
The Internet Systems Consortium (ISC) has issued a security advisory regarding a high-severity denial-of-service (DoS) vulnerability in the Kea DHCPv4 server, tracked as CVE-2025-1...