CVE-2026-28286

8.5 HIGH

📋 TL;DR

This vulnerability allows attackers to bypass frontend restrictions and create files or directories in sensitive system locations like /etc and /usr via direct API calls. It affects ZimaOS users running version 1.5.2-beta3 where the API lacks proper path validation. No authentication is required to exploit this flaw.

💻 Affected Systems

Products:
  • ZimaOS
Versions: 1.5.2-beta3
Operating Systems: ZimaOS (fork of CasaOS)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects both Zima devices and x86-64 systems with UEFI running the vulnerable version. The vulnerability exists in the API layer regardless of frontend configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise through arbitrary file creation in critical directories, enabling privilege escalation, backdoor installation, or system destruction.

🟠

Likely Case

Unauthorized file creation leading to configuration manipulation, service disruption, or data corruption in sensitive system areas.

🟢

If Mitigated

Limited impact if API access is restricted through network controls, though local attackers could still exploit the vulnerability.

🌐 Internet-Facing: HIGH if the API is exposed to the internet, as unauthenticated attackers can directly exploit it.
🏢 Internal Only: HIGH for any system with the vulnerable version, as local network attackers or malicious insiders can exploit it without authentication.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires crafting API requests to target sensitive paths, which is straightforward given the advisory details. No authentication is needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None

Vendor Advisory: https://github.com/IceWhaleTech/ZimaOS/security/advisories/GHSA-65mg-9gw5-vr7g

Restart Required: No

Instructions:

No official patch is available. Monitor the vendor advisory for updates and apply any future patches immediately.

🔧 Temporary Workarounds

Restrict API Network Access

linux

Block external and unnecessary internal access to the ZimaOS API endpoints using firewall rules.

iptables -A INPUT -p tcp --dport [API_PORT] -j DROP
ufw deny [API_PORT]

Disable or Remove Vulnerable Version

all

Replace ZimaOS 1.5.2-beta3 with a non-vulnerable version or alternative OS if possible.

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks and implement strict network segmentation.
  • Monitor API logs for suspicious file creation attempts in system directories and implement alerting.

🔍 How to Verify

Check if Vulnerable:

Check if running ZimaOS version 1.5.2-beta3 via system information or package manager. Test by attempting to create a file in /tmp via API and observing if restrictions apply.

Check Version:

cat /etc/os-release | grep VERSION or check ZimaOS web interface for version information

Verify Fix Applied:

Once a patch is released, verify the fix by testing API requests to create files in restricted paths; they should be rejected with proper error messages.

📡 Detection & Monitoring

Log Indicators:

  • API logs showing file creation requests targeting /etc, /usr, or other system directories
  • System logs showing unexpected file creations in protected paths

Network Indicators:

  • Unusual API traffic patterns, especially POST requests to file creation endpoints with system path parameters

SIEM Query:

source="zimaos_api" AND (path="/etc" OR path="/usr" OR path CONTAINS "system") AND action="create"

🔗 References

📤 Share & Export