Vulnerability Description
ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. Prior to version 1.5.3, a proxy endpoint (/v1/sys/proxy) exposed by ZimaOS's web interface can be abused (via an externally reachable domain using a Cloudflare Tunnel) to make requests to internal localhost services. This results in unauthenticated access to internal-only endpoints and sensitive local services when the product is reachable from the Internet through a Cloudflare Tunnel. This issue has been patched in version 1.5.3.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Zimaspace | Zimaos | < 1.5.3 |
Related Weaknesses (CWE)
References
- https://github.com/IceWhaleTech/ZimaOS/releases/tag/1.5.3ProductRelease Notes
- https://github.com/IceWhaleTech/ZimaOS/security/advisories/GHSA-vqqj-f979-8c8mExploitVendor Advisory
FAQ
What is CVE-2026-28798?
CVE-2026-28798 is a vulnerability with a CVSS score of 9.0 (CRITICAL). ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. Prior to version 1.5.3, a proxy endpoint (/v1/sys/proxy) exposed by ZimaOS's web interface can be abused ...
How severe is CVE-2026-28798?
CVE-2026-28798 has been rated CRITICAL with a CVSS base score of 9.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-28798?
Check the references section above for vendor advisories and patch information. Affected products include: Zimaspace Zimaos.