ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.5.0 and prior, due to insufficient validation or restriction of target URLs, an authenticated local user can craft requests that target internal IP addresses (e.g., 127.0.0.1, localhost, or private network ranges). This allows the attacker to interact with internal HTTP/HTTPS services that are not intended to be exposed externally or to local users. No known patch is publicly available.
Metrics
Affected Vendors & Products
References
History
Wed, 04 Mar 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Icewhaletech
Icewhaletech zimaos |
|
| Vendors & Products |
Icewhaletech
Icewhaletech zimaos |
Tue, 03 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 02 Mar 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.5.0 and prior, due to insufficient validation or restriction of target URLs, an authenticated local user can craft requests that target internal IP addresses (e.g., 127.0.0.1, localhost, or private network ranges). This allows the attacker to interact with internal HTTP/HTTPS services that are not intended to be exposed externally or to local users. No known patch is publicly available. | |
| Title | ZimaOS is vulnerable to Server-Side Request Forgery (SSRF) | |
| Weaknesses | CWE-200 CWE-918 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2026-03-02T16:28:42.534Z
Updated: 2026-03-03T15:44:30.566Z
Reserved: 2025-11-03T22:12:51.364Z
Link: CVE-2025-64427
Updated: 2026-03-03T15:41:52.547Z
Status : Awaiting Analysis
Published: 2026-03-02T17:16:28.617
Modified: 2026-03-02T20:29:29.330
Link: CVE-2025-64427
No data.