CVE-2025-64427

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.5.0 and prior, due to insufficient validation or restriction of target URLs, an authenticated local user can craft requests that target internal IP addresses (e.g., 127.0.0.1, localhost, or private network ranges). This allows the attacker to interact with internal HTTP/HTTPS services that are not intended to be exposed externally or to local users. No known patch is publicly available.
References
Configurations

Configuration 1 (hide)

cpe:2.3:o:zimaspace:zimaos:*:*:*:*:*:*:*:*

History

05 Mar 2026, 15:18

Type Values Removed Values Added
CPE cpe:2.3:o:zimaspace:zimaos:*:*:*:*:*:*:*:*
References () https://github.com/IceWhaleTech/ZimaOS/security/advisories/GHSA-m8hj-7xg5-p375 - () https://github.com/IceWhaleTech/ZimaOS/security/advisories/GHSA-m8hj-7xg5-p375 - Exploit, Mitigation, Vendor Advisory
First Time Zimaspace
Zimaspace zimaos

02 Mar 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-02 17:16

Updated : 2026-03-05 15:18


NVD link : CVE-2025-64427

Mitre link : CVE-2025-64427

CVE.ORG link : CVE-2025-64427


JSON object : View

Products Affected

zimaspace

  • zimaos
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor

CWE-918

Server-Side Request Forgery (SSRF)