EUVD-2026-18843

| CVE-2026-28798 CRITICAL
2026-04-03 [email protected]
9.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
EUVD ID Assigned
Apr 03, 2026 - 20:22 euvd
EUVD-2026-18843
Analysis Generated
Apr 03, 2026 - 20:22 vuln.today
CVE Published
Apr 03, 2026 - 20:16 nvd
CRITICAL 9.0

Tags

Description

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. Prior to version 1.5.3, a proxy endpoint (/v1/sys/proxy) exposed by ZimaOS's web interface can be abused (via an externally reachable domain using a Cloudflare Tunnel) to make requests to internal localhost services. This results in unauthenticated access to internal-only endpoints and sensitive local services when the product is reachable from the Internet through a Cloudflare Tunnel. This issue has been patched in version 1.5.3.

Analysis

Server-side request forgery (SSRF) in ZimaOS web interface allows unauthenticated remote attackers to access internal localhost services when the system is exposed via Cloudflare Tunnel. The vulnerable proxy endpoint (/v1/sys/proxy) enables attackers to bypass network segmentation and reach internal-only endpoints, potentially exposing sensitive local services. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

24 hours: Immediately isolate any ZimaOS instances from external access (disable Cloudflare Tunnel exposure or restrict to authorized IP ranges only); verify ZimaOS version across all deployments. 7 days: Monitor for ZimaOS 1.5.3 or later release; conduct access logs review for /v1/sys/proxy endpoint abuse patterns; implement network segmentation to restrict localhost service access. …

Sign in for detailed remediation steps.

Priority Score

45
Low Medium High Critical
KEV: 0
EPSS: +0.0
CVSS: +45
POC: 0

Share

EUVD-2026-18843 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy