Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Top 15 Enterprise Use Cases That Justify Hiring Node.js Developers in 2025

      July 31, 2025

      The Core Model: Start FROM The Answer, Not WITH The Solution

      July 31, 2025

      AI-Generated Code Poses Major Security Risks in Nearly Half of All Development Tasks, Veracode Research Reveals   

      July 31, 2025

      Understanding the code modernization conundrum

      July 31, 2025

      Not just YouTube: Google is using AI to guess your age based on your activity – everywhere

      July 31, 2025

      Malicious extensions can use ChatGPT to steal your personal data – here’s how

      July 31, 2025

      What Zuckerberg’s ‘personal superintelligence’ sales pitch leaves out

      July 31, 2025

      This handy NordVPN tool flags scam calls on Android – even before you answer

      July 31, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Route Optimization through Laravel’s Shallow Resource Architecture

      July 31, 2025
      Recent

      Route Optimization through Laravel’s Shallow Resource Architecture

      July 31, 2025

      This Week in Laravel: Laracon News, Free Laravel Idea, and Claude Code Course

      July 31, 2025

      Everything We Know About Pest 4

      July 31, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      FOSS Weekly #25.31: Kernel 6.16, OpenMandriva Review, Conky Customization, System Monitoring and More

      July 31, 2025
      Recent

      FOSS Weekly #25.31: Kernel 6.16, OpenMandriva Review, Conky Customization, System Monitoring and More

      July 31, 2025

      Windows 11’s MSN Widgets board now opens in default browser, such as Chrome (EU only)

      July 31, 2025

      Microsoft’s new “move to Windows 11” campaign implies buying OneDrive paid plan

      July 31, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-47849 – Apache CloudStack Domain Admin Privilege Escalation Vulnerability

    CVE-2025-47849 – Apache CloudStack Domain Admin Privilege Escalation Vulnerability

    June 10, 2025

    CVE ID : CVE-2025-47849

    Published : June 10, 2025, 11:15 p.m. | 2 hours, 34 minutes ago

    Description : A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can get the API key and secret key of user-accounts of Admin role type in the same domain. This operation is not appropriately restricted and allows the attacker to assume control over higher-privileged user-accounts. A malicious Domain Admin attacker can impersonate an Admin user-account and gain access to sensitive APIs and resources that could result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of infrastructure managed by CloudStack.

    Users are recommended to upgrade to Apache CloudStack 4.19.3.0 or 4.20.1.0, which fixes the issue with the following:

    * Strict validation on Role Type hierarchy: the caller’s role must be equal to or higher than the target user’s role. 
    * API privilege comparison: the caller must possess all privileges of the user they are operating on. 
    * Two new domain-level settings (restricted to the default admin): 
     - role.types.allowed.for.operations.on.accounts.of.same.role.type: Defines which role types are allowed to act on users of the same role type. Default: “Admin, DomainAdmin, ResourceAdmin”. 
     - allow.operations.on.users.in.same.account: Allows/disallows user operations within the same account. Default: true.

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleLearn the MERN Stack in 2025
    Next Article CVE-2025-47114 – Adobe Experience Manager Stored Cross-Site Scripting Vulnerability

    Related Posts

    Development

    The hidden risks of browser extensions – and how to stay safe

    July 31, 2025
    Development

    Minnesota National Guard Deployed After Major Cyberattack on St. Paul City Systems

    July 31, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    SBOMs Without the F-Bombs

    Tech & Work

    CVE-2025-5697 – Brilliance Golden Link Secondary System SQL Injection Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Catchpoint adds OpenTelemetry-based real-user monitoring for mobile devices

    Tech & Work

    Coding Careers Under Threat: Impacts of AI, No-Code Platforms, and Economic Pressures

    Web Development

    Highlights

    CodeSOD: Format Identified

    May 28, 2025

    Many nations have some form of national identification number, especially around taxes. Argentina is no…

    CES 2015 in Las Vegas: first impressions, 5 hot topics

    April 9, 2025

    Live Raizo – live Debian-based Linux distribution

    April 14, 2025

    Learn to Speak German

    June 19, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.