Zimaos

6 CVEs product

Monthly

CVE-2026-28442 HIGH POC This Week

ZimaOS 1.5.2-beta3 fails to validate filesystem paths in its API delete endpoint, allowing authenticated users to bypass UI restrictions and remove critical system files and directories. Public exploit code exists for this vulnerability, and the lack of input validation on path parameters enables attackers with API access to potentially render the system unbootable or cause denial of service. No patch is currently available.

Authentication Bypass Zimaos
NVD GitHub
CVSS 3.1
8.5
EPSS
0.0%
CVE-2026-28286 HIGH POC This Week

ZimaOS 1.5.2-beta3 lacks proper path validation in its API, allowing authenticated users to bypass frontend restrictions and write files to protected system directories such as /etc and /usr. Public exploit code exists for this vulnerability, enabling attackers with valid credentials to modify critical OS files and potentially achieve code execution. No patch is currently available.

Information Disclosure Zimaos
NVD GitHub
CVSS 3.1
8.5
EPSS
0.1%
CVE-2025-64427 HIGH POC This Week

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. [CVSS 7.1 HIGH]

Information Disclosure Zimaos
NVD GitHub
CVSS 3.1
7.1
EPSS
0.0%
CVE-2026-21891 CRITICAL POC THREAT Emergency

ZimaOS (fork of CasaOS) through 1.5.0 has an authentication bypass where passwords for system service accounts are not properly validated during login. Attackers can access the system using known service account names with any password. PoC available, EPSS 13.6%.

Authentication Bypass Zimaos
NVD GitHub
CVSS 3.1
9.4
EPSS
13.6%
CVE-2025-58432 MEDIUM POC This Month

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. Rated medium severity (CVSS 5.2), this vulnerability is no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

File Upload Privilege Escalation Zimaos
NVD GitHub
CVSS 4.0
5.2
EPSS
0.0%
CVE-2025-58431 MEDIUM POC This Month

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. Rated medium severity (CVSS 4.8), this vulnerability is no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Privilege Escalation Zimaos
NVD GitHub
CVSS 4.0
4.8
EPSS
0.0%
CVE-2026-28442
EPSS 0% CVSS 8.5
HIGH POC This Week

ZimaOS 1.5.2-beta3 fails to validate filesystem paths in its API delete endpoint, allowing authenticated users to bypass UI restrictions and remove critical system files and directories. Public exploit code exists for this vulnerability, and the lack of input validation on path parameters enables attackers with API access to potentially render the system unbootable or cause denial of service. No patch is currently available.

Authentication Bypass Zimaos
NVD GitHub
CVE-2026-28286
EPSS 0% CVSS 8.5
HIGH POC This Week

ZimaOS 1.5.2-beta3 lacks proper path validation in its API, allowing authenticated users to bypass frontend restrictions and write files to protected system directories such as /etc and /usr. Public exploit code exists for this vulnerability, enabling attackers with valid credentials to modify critical OS files and potentially achieve code execution. No patch is currently available.

Information Disclosure Zimaos
NVD GitHub
CVE-2025-64427
EPSS 0% CVSS 7.1
HIGH POC This Week

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. [CVSS 7.1 HIGH]

Information Disclosure Zimaos
NVD GitHub
CVE-2026-21891
EPSS 14% CVSS 9.4
CRITICAL POC THREAT Emergency

ZimaOS (fork of CasaOS) through 1.5.0 has an authentication bypass where passwords for system service accounts are not properly validated during login. Attackers can access the system using known service account names with any password. PoC available, EPSS 13.6%.

Authentication Bypass Zimaos
NVD GitHub
CVE-2025-58432
EPSS 0% CVSS 5.2
MEDIUM POC This Month

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. Rated medium severity (CVSS 5.2), this vulnerability is no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

File Upload Privilege Escalation Zimaos
NVD GitHub
CVE-2025-58431
EPSS 0% CVSS 4.8
MEDIUM POC This Month

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. Rated medium severity (CVSS 4.8), this vulnerability is no authentication required, low attack complexity. Public exploit code available and no vendor patch available.

Privilege Escalation Zimaos
NVD GitHub

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy