


Perceptive Security
SOC/SIEM Consultancy

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.5.0 and prior, due to insufficient validation or res…
Published:
1 March 2026 at 23:00:00
Alert date:
2 March 2026 at 18:02:45
Source:
nvd.nist.gov
Operating Systems, Mobile & IoT
ZimaOS, a fork of CasaOS operating system for Zima devices and x86-64 systems, contains a server-side request forgery (SSRF) vulnerability in version 1.5.0 and prior. The vulnerability stems from insufficient validation of target URLs, allowing authenticated local users to craft malicious requests targeting internal IP addresses including localhost and private network ranges. This enables attackers to interact with internal HTTP/HTTPS services that should not be accessible externally or to local users. The vulnerability poses significant security risks as it can lead to unauthorized access to internal services and potential lateral movement within the network. Currently, no patch is publicly available for this vulnerability.
Technical details
Mitigation steps:
Affected products:
ZimaOS
CasaOS
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2025-64427
https://github.com/IceWhaleTech/ZimaOS/security/advisories/GHSA-m8hj-7xg5-p375
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
