Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34171: CWE-862 Missing Authorization in IceWhale Tech CasaOS

0
Medium
VulnerabilityCVE-2025-34171cvecve-2025-34171cwe-862cwe-497
Published: Sat Jan 03 2026 (01/03/2026, 21:18:51 UTC)
Source: CVE Database V5
Vendor/Project: IceWhale Tech
Product: CasaOS

Description

CasaOS versions up to and including 0.4.15 expose multiple unauthenticated endpoints that allow remote attackers to retrieve sensitive configuration files and system debug information. The /v1/users/image endpoint can be abused with a user-controlled path parameter to access files under /var/lib/casaos/1/, which reveals installed applications and configuration details. Additionally, /v1/sys/debug discloses host operating system, kernel, hardware, and storage information. The endpoints also return distinct error messages, enabling file existence enumeration of arbitrary paths on the underlying host filesystem. This information disclosure can be used for reconnaissance and to facilitate targeted follow-up attacks against services deployed on the host.

AI-Powered Analysis

AILast updated: 01/10/2026, 00:13:54 UTC

Technical Analysis

CVE-2025-34171 is a missing authorization vulnerability (CWE-862) in IceWhale Tech's CasaOS versions up to 0.4.15. The flaw arises because several REST API endpoints are accessible without authentication, exposing sensitive internal data. Specifically, the /v1/users/image endpoint accepts a user-controlled path parameter that allows arbitrary file read access under the directory /var/lib/casaos/1/. This can disclose installed applications and configuration files, which may contain sensitive operational details. The /v1/sys/debug endpoint reveals comprehensive system debug information including host operating system details, kernel version, hardware specifications, and storage configuration. Furthermore, the endpoints return distinct error messages that enable attackers to perform file existence enumeration on arbitrary paths in the underlying host filesystem. This combination of information disclosure vectors can be leveraged by attackers to perform detailed reconnaissance on the target system, identify potential weaknesses, and plan subsequent targeted attacks. The vulnerability does not require authentication, user interaction, or privileges, and can be exploited remotely over the network. Although no public exploits are known, the vulnerability’s characteristics make it a significant risk for information leakage. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and low impact on confidentiality, with no impact on integrity or availability.

Potential Impact

For European organizations deploying CasaOS, this vulnerability poses a risk of sensitive information leakage that could facilitate further attacks. Disclosure of configuration files and installed applications can reveal system architecture and software versions, aiding attackers in identifying exploitable components. The debug information leak provides detailed host environment data, which can be used to tailor exploits or pivot within the network. This is particularly concerning for organizations using CasaOS in critical infrastructure, small and medium enterprises, or home office environments where CasaOS may manage storage or IoT devices. The ability to enumerate file existence can also expose sensitive files or credentials stored on the host. While the vulnerability does not directly allow code execution or data modification, the reconnaissance advantage it grants can lead to more severe compromises. Given the growing adoption of CasaOS in Europe, especially in Germany, France, and the Netherlands where smart home and small business NAS solutions are popular, the impact could be significant if left unmitigated.

Mitigation Recommendations

Organizations should immediately upgrade CasaOS to a version beyond 0.4.15 once patches become available that enforce proper authorization on these endpoints. Until patches are released, network-level mitigations should be applied: restrict access to CasaOS management interfaces to trusted internal networks or VPNs, and implement firewall rules blocking external access to the vulnerable API endpoints. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting /v1/users/image and /v1/sys/debug endpoints. Conduct thorough audits of CasaOS deployments to identify exposed instances and monitor logs for unusual access patterns or repeated file enumeration attempts. Additionally, consider isolating CasaOS hosts from critical network segments to limit lateral movement if compromise occurs. Security teams should also educate users on the risks of exposing CasaOS interfaces publicly and enforce strong network segmentation. Finally, maintain up-to-date backups and incident response plans in case follow-up attacks succeed.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.567Z
Cvss Version
null
State
REJECTED

Threat ID: 6957f5dddb813ff03ef50c96

Added to database: 1/2/2026, 4:44:13 PM

Last enriched: 1/10/2026, 12:13:54 AM

Last updated: 2/7/2026, 2:27:40 PM

Views: 45

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats