Skip to main content
COSMICBYTEZLABS
NewsSecurityHOWTOsToolsStudyTraining
ProjectsChecklistsAI RankingsNewsletterStatusTagsAbout
Subscribe

Press Enter to search or Esc to close

News
Security
HOWTOs
Tools
Study
Training
Projects
Checklists
AI Rankings
Newsletter
Status
Tags
About
RSS Feed
Reading List
Subscribe

Stay in the Loop

Get the latest security alerts, tutorials, and tech insights delivered to your inbox.

Subscribe NowFree forever. No spam.
COSMICBYTEZLABS

Your trusted source for IT intelligence, cybersecurity insights, and hands-on technical guides.

912+ Articles
122+ Guides

CONTENT

  • Latest News
  • Security Alerts
  • HOWTOs
  • Projects
  • Exam Prep

RESOURCES

  • Search
  • Browse Tags
  • Newsletter Archive
  • Reading List
  • RSS Feed

COMPANY

  • About Us
  • Contact
  • Privacy Policy
  • Terms of Service

© 2026 CosmicBytez Labs. All rights reserved.

System Status: Operational
  1. Home
  2. Security
  3. CVE-2026-25199: Apache CloudStack Proxmox Extension Allows Unauthorized Cross-Tenant Instance Access
CVE-2026-25199: Apache CloudStack Proxmox Extension Allows Unauthorized Cross-Tenant Instance Access

Critical Security Alert

This vulnerability is actively being exploited. Immediate action is recommended.

SECURITYCRITICALCVE-2026-25199

CVE-2026-25199: Apache CloudStack Proxmox Extension Allows Unauthorized Cross-Tenant Instance Access

A critical tenant isolation vulnerability in Apache CloudStack's Proxmox extension (CVSS 9.1) allows one tenant to access and control VM instances belonging to other tenants by manipulating the user-editable proxmox_vmid setting. Affects versions 4.21.0.0 through 4.22.0.0.

Dylan H.

Security Team

May 9, 2026
6 min read

Affected Products

  • Apache CloudStack 4.21.0.0 through 4.22.0.0 (Proxmox extension)

CVE-2026-25199: Apache CloudStack Proxmox Tenant Isolation Bypass

A critical tenant isolation vulnerability tracked as CVE-2026-25199 has been disclosed in Apache CloudStack, the open-source cloud infrastructure platform used to deploy and manage large-scale virtualized environments. The flaw exists in the Proxmox hypervisor extension and allows a tenant to gain unauthorized access to VM instances belonging to other tenants by exploiting a user-editable instance setting.

The vulnerability was published on May 8, 2026, assigned a CVSS v3.1 score of 9.1 (Critical), and affects Apache CloudStack versions 4.21.0.0 through 4.22.0.0 with the Proxmox extension enabled.


Vulnerability Overview

AttributeValue
CVE IDCVE-2026-25199
CVSS Score9.1 (Critical)
CWE ClassificationCWE-284 — Improper Access Control
Affected ComponentProxmox extension for Apache CloudStack
Affected Versions4.21.0.0 through 4.22.0.0
Attack VectorNetwork
Authentication RequiredLow (authenticated tenant user)
User InteractionNone
Primary ImpactCross-tenant VM instance access and control

Affected Versions

ProductAffected Range
Apache CloudStack4.21.0.0 through 4.22.0.0
Proxmox ExtensionBundled with affected CloudStack versions

Deployments using CloudStack with Proxmox as the hypervisor backend are affected. Deployments using other hypervisor backends (VMware, KVM without Proxmox integration, XenServer) are not affected by this specific vulnerability.


Technical Details

Root Cause: User-Editable VMID Mapping

The Proxmox extension for Apache CloudStack bridges the CloudStack management plane with a Proxmox VE hypervisor cluster. When an instance is deployed via the Proxmox backend, CloudStack stores the corresponding Proxmox VM ID in an instance-level setting named proxmox_vmid.

The critical design flaw is that proxmox_vmid is stored as a user-editable instance setting. A tenant user who has access to their own instance can modify this field, pointing it to the VMID of a VM belonging to a different tenant. CloudStack then uses the attacker-controlled VMID when issuing subsequent management operations to the Proxmox backend — treating the target VM as if it were the attacker's own instance.

Exploitation Path

Authenticated tenant user
  → Identifies proxmox_vmid of target tenant's VM
    (via guessing sequential VMIDs, Proxmox UI access, or information disclosure)
  → Modifies own instance's proxmox_vmid to target value
  → Issues CloudStack management operations (stop, start, snapshot, migrate, etc.)
    → CloudStack passes attacker-controlled VMID to Proxmox backend
      → Proxmox executes operation on the target tenant's VM
        → Cross-tenant VM access and control achieved

What an Attacker Can Do

Once the proxmox_vmid is set to a victim tenant's VM, the attacker can:

  • Start/stop/reboot the victim tenant's instances, causing service disruption
  • Create snapshots of victim instances, potentially exfiltrating disk contents
  • Migrate victim instances to attacker-controlled hosts
  • Delete victim instances and associated storage volumes
  • Access instance consoles to interact with running systems

Impact Assessment

Impact AreaDescription
Data ConfidentialityAttacker can snapshot and access disk contents of other tenants' VMs
Service AvailabilityAttacker can stop or delete other tenants' running instances
Data IntegrityAttacker can modify running state, inject into snapshots, or corrupt storage
Multi-Tenant IsolationFundamental cloud boundary between tenants is broken
ComplianceViolates data isolation requirements in regulated environments (PCI DSS, HIPAA, SOC 2, FedRAMP)
Cloud Provider LiabilityMSPs and cloud providers face significant liability if tenant data is accessed

The severity is amplified in managed service provider (MSP) and public cloud contexts, where multiple unrelated customers share the same CloudStack/Proxmox infrastructure. In these environments, a single malicious or compromised tenant account can access every other tenant's virtual machines.


Remediation

Upgrade Apache CloudStack

Update Apache CloudStack to a patched version. Monitor the Apache CloudStack Security page for the official patched release announcement following CVE-2026-25199 disclosure.

Interim Mitigations

While awaiting a patched release:

  1. Restrict user ability to modify instance settings — Evaluate whether the CloudStack API can be locked down to prevent non-admin modification of proxmox_vmid through API ACL customizations or custom role restrictions

  2. Audit existing instances — Check for any proxmox_vmid values that do not correspond to the correct tenant's VMID namespace:

    • Review CloudStack instance settings via the admin API
    • Cross-reference proxmox_vmid values against expected Proxmox VM ownership records
  3. Monitor for anomalous VMID references — Alert on CloudStack API calls that reference VMIDs outside the calling tenant's allocated range

  4. Restrict Proxmox API credentials — Ensure the CloudStack service account on Proxmox has the minimum permissions required; consider whether per-tenant Proxmox accounts are feasible

  5. Temporarily disable the Proxmox extension — If alternative hypervisor backends are available, consider migrating workloads off Proxmox until a patch is applied


Context: Apache CloudStack and Proxmox Adoption

Apache CloudStack is widely deployed by managed cloud service providers, enterprise private clouds, and telco infrastructure operators as an alternative to OpenStack and commercial cloud management platforms. The addition of Proxmox VE as a supported hypervisor backend — introduced in recent CloudStack versions — expanded its appeal to organizations already running Proxmox infrastructure.

CVE-2026-25199 is a textbook example of broken object-level authorization in multi-tenant infrastructure: user-controlled identifiers are used to reference shared resources without verification that the identifier maps to a resource the authenticated user is permitted to access. This vulnerability class consistently appears in cloud infrastructure due to the complexity of associating logical resource identifiers with physical hypervisor objects across abstraction layers.


Key Takeaways

  1. CVE-2026-25199 is a CVSS 9.1 critical tenant isolation bypass in Apache CloudStack's Proxmox extension, affecting versions 4.21.0.0 through 4.22.0.0
  2. The root cause is that proxmox_vmid is user-editable, allowing tenants to redirect CloudStack operations to other tenants' VMs
  3. Successful exploitation enables cross-tenant VM access, snapshot creation, service disruption, and data exfiltration
  4. Only deployments using CloudStack with the Proxmox extension are affected — other hypervisor backends are not impacted
  5. Upgrade to a patched CloudStack version immediately; apply API access controls and VMID auditing as interim measures
  6. MSPs and cloud providers operating multi-tenant Proxmox deployments via CloudStack should treat this as critical business risk

Sources

  • CVE-2026-25199 — NIST NVD
  • Apache CloudStack Security Advisories
  • Apache CloudStack Proxmox Extension Documentation
#CVE-2026-25199#Apache CloudStack#Proxmox#Tenant Isolation#Cloud Security#Multi-Tenancy#Virtualization#Unauthorized Access#CWE-284#Critical

Related Articles

CVE-2026-32604: Spinnaker Clouddriver Remote Code Execution (CVSS 9.9)

A critical unauthenticated RCE vulnerability in Spinnaker's clouddriver service allows attackers to execute arbitrary commands on clouddriver pods,...

2 min read

CVE-2026-32613: Spinnaker Echo Spring Expression Language Injection (CVSS 9.9)

A critical code injection flaw in Spinnaker's Echo service allows unrestricted Spring Expression Language (SPeL) execution via artifact processing,...

4 min read

CVE-2026-21994: Critical Unauthenticated RCE in Oracle Edge Cloud Infrastructure Designer v0.3.0

A critical unauthenticated remote code execution vulnerability (CVSS 9.8) in Oracle's Edge Cloud Infrastructure Designer and Visualisation Toolkit allows...

6 min read
Back to all Security Alerts