The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2025-47713

CVE-2025-47713: Apache CloudStack Privilege Escalation

CVE-2025-47713 is a privilege escalation vulnerability in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 allowing Domain Admins to reset Admin passwords and gain unauthorized access. This article covers technical details, affected versions, impact, and mitigation steps.

Updated: January 22, 2026

CVE-2025-47713 Overview

A privilege escalation vulnerability exists in Apache CloudStack versions 4.10.0.0 through 4.20.0.0 where a malicious Domain Admin user in the ROOT domain can reset the password of user-accounts with Admin role type. This operation is not appropriately restricted, allowing an attacker to assume control over higher-privileged user-accounts. A malicious Domain Admin attacker can impersonate an Admin user-account and gain access to sensitive APIs and resources that could result in the compromise of resource integrity and confidentiality, data loss, denial of service, and availability of infrastructure managed by CloudStack.

Critical Impact

Malicious Domain Admin users in the ROOT domain can escalate privileges by resetting passwords of Admin-level accounts, potentially compromising entire CloudStack infrastructure including all managed resources and data.

Affected Products

  • Apache CloudStack versions 4.10.0.0 through 4.20.0.0
  • Apache CloudStack deployments with ROOT domain Domain Admin users
  • CloudStack environments without strict role hierarchy validation

Discovery Timeline

  • June 10, 2025 - CVE-2025-47713 published to NVD
  • July 1, 2025 - Last updated in NVD database

Technical Details for CVE-2025-47713

Vulnerability Analysis

This privilege escalation vulnerability (CWE-269: Improper Privilege Management) stems from inadequate access control enforcement in Apache CloudStack's user account management functionality. The vulnerability allows Domain Admin users operating within the ROOT domain to perform password reset operations against user-accounts that possess higher privilege levels, specifically those with the Admin role type.

The attack enables horizontal and vertical privilege escalation by allowing a lower-privileged administrative role to manipulate credentials of accounts with elevated permissions. Once an attacker successfully resets an Admin account's password, they can authenticate as that higher-privileged user and access sensitive management APIs, control infrastructure resources, and potentially compromise the entire CloudStack deployment.

The vulnerability is particularly severe because CloudStack is typically used to manage large-scale cloud infrastructure, meaning a successful exploit could grant an attacker control over virtual machines, storage systems, network configurations, and other critical cloud resources.

Root Cause

The root cause of this vulnerability is the absence of proper role type hierarchy validation when processing user account operations. The affected versions fail to verify that the caller's user-account role is equal to or higher than the target user-account's role before permitting password reset operations. Additionally, the system does not perform an API privilege comparison to ensure the caller possesses all privileges of the user they are attempting to operate on.

Attack Vector

The attack vector is network-based and requires the attacker to have low-privileged access (Domain Admin role in the ROOT domain). The exploitation scenario involves:

  1. An attacker with Domain Admin privileges in the ROOT domain identifies Admin-level user accounts
  2. The attacker initiates a password reset operation targeting an Admin user-account
  3. Due to missing role hierarchy validation, the system processes the request without proper authorization checks
  4. The attacker sets a new password for the Admin account
  5. The attacker authenticates using the compromised Admin credentials
  6. With Admin access, the attacker can access sensitive APIs, modify infrastructure, exfiltrate data, or cause denial of service

The vulnerability does not require user interaction and can be exploited remotely through the CloudStack management interface or API endpoints. The impact affects confidentiality, integrity, and availability of the managed infrastructure.

Detection Methods for CVE-2025-47713

Indicators of Compromise

  • Unexpected password reset events for Admin-level user accounts in CloudStack audit logs
  • Authentication attempts from unusual IP addresses or locations for privileged accounts
  • Domain Admin users from ROOT domain performing operations on Admin accounts
  • Sudden changes in API access patterns or resource modifications by previously low-activity Admin accounts
  • Anomalous management plane activity following user account modifications

Detection Strategies

  • Monitor CloudStack management server logs for password reset API calls targeting Admin role accounts
  • Implement alerting on any password changes for privileged user accounts outside of normal change windows
  • Audit trail analysis for Domain Admin users performing operations on accounts with higher role types
  • Review user account management events for cross-role boundary violations
  • Deploy SIEM rules to correlate password resets followed by immediate privileged API access

Monitoring Recommendations

  • Enable comprehensive audit logging for all user account management operations in CloudStack
  • Configure real-time alerts for password reset operations involving Admin-level accounts
  • Implement session monitoring for privileged accounts to detect unauthorized access after credential changes
  • Establish baseline behavior profiles for administrative accounts to identify anomalous post-compromise activity
  • Monitor for bulk operations or rapid sequential privilege escalation attempts

How to Mitigate CVE-2025-47713

Immediate Actions Required

  • Upgrade Apache CloudStack to version 4.19.3.0 or 4.20.1.0 immediately
  • Audit all Domain Admin accounts in the ROOT domain for potential compromise
  • Review CloudStack logs for historical evidence of exploitation
  • Force password resets for all Admin-level accounts as a precautionary measure
  • Restrict network access to CloudStack management interfaces to trusted networks

Patch Information

Apache CloudStack has released security patches in versions 4.19.3.0 and 4.20.1.0 that address this vulnerability. The fix implements the following security controls:

  • Strict validation on Role Type hierarchy: The caller's user-account role must be equal to or higher than the target user-account's role
  • API privilege comparison: The caller must possess all privileges of the user they are operating on
  • New domain-level settings (restricted to default Admin):
    • role.types.allowed.for.operations.on.accounts.of.same.role.type: Defines which role types are allowed to act on users of the same role type (Default: "Admin, DomainAdmin, ResourceAdmin")
    • allow.operations.on.users.in.same.account: Allows/disallows user operations within the same account (Default: true)

For detailed patch information, refer to the Apache CloudStack CVE Advisory and the ShapeBlue Security Advisory.

Workarounds

  • Minimize the number of Domain Admin accounts in the ROOT domain to reduce attack surface
  • Implement network segmentation to restrict access to CloudStack management APIs from untrusted networks
  • Enable multi-factor authentication for all administrative accounts where supported
  • Implement external access controls and API gateways to add additional authorization layers
  • Consider disabling or closely monitoring Domain Admin accounts in ROOT domain until patching is complete
bash
# Post-upgrade verification: Check CloudStack version
cloudstack-setup-management --version

# Review new security settings after upgrade
cloudstack-setup-management -Dcloud.role.types.allowed.for.operations.on.accounts.of.same.role.type="Admin"
cloudstack-setup-management -Dcloud.allow.operations.on.users.in.same.account="false"

# Verify global settings are applied
mysql -u cloud -p cloudstack -e "SELECT name, value FROM configuration WHERE name LIKE '%role%' OR name LIKE '%operations%users%';"

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypePrivilege Escalation

  • Vendor/TechApache Cloudstack

  • SeverityHIGH

  • CVSS Score8.8

  • EPSS Probability0.11%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-269
  • Technical References
  • ShapeBlue Security Advisory
  • Vendor Resources
  • Apache CloudStack CVE Advisory

  • Apache Mailing List Thread
  • Related CVEs
  • CVE-2024-29006: Apache CloudStack Auth Bypass Vulnerability

  • CVE-2024-41107: Apache CloudStack Auth Bypass Vulnerability

  • CVE-2024-39864: Apache CloudStack RCE Vulnerability

  • CVE-2024-38346: Apache CloudStack RCE Vulnerability
Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English