CVE-2025-34171: CWE-862 Missing Authorization in IceWhale Tech CasaOS
CasaOS versions up to and including 0.4.15 expose multiple unauthenticated endpoints that allow remote attackers to retrieve sensitive configuration files and system debug information. The /v1/users/image endpoint can be abused with a user-controlled path parameter to access files under /var/lib/casaos/1/, which reveals installed applications and configuration details. Additionally, /v1/sys/debug discloses host operating system, kernel, hardware, and storage information. The endpoints also return distinct error messages, enabling file existence enumeration of arbitrary paths on the underlying host filesystem. This information disclosure can be used for reconnaissance and to facilitate targeted follow-up attacks against services deployed on the host.
AI Analysis
Technical Summary
CVE-2025-34171 is a missing authorization vulnerability (CWE-862) in IceWhale Tech's CasaOS versions up to 0.4.15. The flaw arises because several REST API endpoints are accessible without authentication, exposing sensitive internal data. Specifically, the /v1/users/image endpoint accepts a user-controlled path parameter that allows arbitrary file read access under the directory /var/lib/casaos/1/. This can disclose installed applications and configuration files, which may contain sensitive operational details. The /v1/sys/debug endpoint reveals comprehensive system debug information including host operating system details, kernel version, hardware specifications, and storage configuration. Furthermore, the endpoints return distinct error messages that enable attackers to perform file existence enumeration on arbitrary paths in the underlying host filesystem. This combination of information disclosure vectors can be leveraged by attackers to perform detailed reconnaissance on the target system, identify potential weaknesses, and plan subsequent targeted attacks. The vulnerability does not require authentication, user interaction, or privileges, and can be exploited remotely over the network. Although no public exploits are known, the vulnerability’s characteristics make it a significant risk for information leakage. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and low impact on confidentiality, with no impact on integrity or availability.
Potential Impact
For European organizations deploying CasaOS, this vulnerability poses a risk of sensitive information leakage that could facilitate further attacks. Disclosure of configuration files and installed applications can reveal system architecture and software versions, aiding attackers in identifying exploitable components. The debug information leak provides detailed host environment data, which can be used to tailor exploits or pivot within the network. This is particularly concerning for organizations using CasaOS in critical infrastructure, small and medium enterprises, or home office environments where CasaOS may manage storage or IoT devices. The ability to enumerate file existence can also expose sensitive files or credentials stored on the host. While the vulnerability does not directly allow code execution or data modification, the reconnaissance advantage it grants can lead to more severe compromises. Given the growing adoption of CasaOS in Europe, especially in Germany, France, and the Netherlands where smart home and small business NAS solutions are popular, the impact could be significant if left unmitigated.
Mitigation Recommendations
Organizations should immediately upgrade CasaOS to a version beyond 0.4.15 once patches become available that enforce proper authorization on these endpoints. Until patches are released, network-level mitigations should be applied: restrict access to CasaOS management interfaces to trusted internal networks or VPNs, and implement firewall rules blocking external access to the vulnerable API endpoints. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting /v1/users/image and /v1/sys/debug endpoints. Conduct thorough audits of CasaOS deployments to identify exposed instances and monitor logs for unusual access patterns or repeated file enumeration attempts. Additionally, consider isolating CasaOS hosts from critical network segments to limit lateral movement if compromise occurs. Security teams should also educate users on the risks of exposing CasaOS interfaces publicly and enforce strong network segmentation. Finally, maintain up-to-date backups and incident response plans in case follow-up attacks succeed.
Affected Countries
Germany, France, Netherlands, United Kingdom, Italy, Spain
CVE-2025-34171: CWE-862 Missing Authorization in IceWhale Tech CasaOS
Description
CasaOS versions up to and including 0.4.15 expose multiple unauthenticated endpoints that allow remote attackers to retrieve sensitive configuration files and system debug information. The /v1/users/image endpoint can be abused with a user-controlled path parameter to access files under /var/lib/casaos/1/, which reveals installed applications and configuration details. Additionally, /v1/sys/debug discloses host operating system, kernel, hardware, and storage information. The endpoints also return distinct error messages, enabling file existence enumeration of arbitrary paths on the underlying host filesystem. This information disclosure can be used for reconnaissance and to facilitate targeted follow-up attacks against services deployed on the host.
AI-Powered Analysis
Technical Analysis
CVE-2025-34171 is a missing authorization vulnerability (CWE-862) in IceWhale Tech's CasaOS versions up to 0.4.15. The flaw arises because several REST API endpoints are accessible without authentication, exposing sensitive internal data. Specifically, the /v1/users/image endpoint accepts a user-controlled path parameter that allows arbitrary file read access under the directory /var/lib/casaos/1/. This can disclose installed applications and configuration files, which may contain sensitive operational details. The /v1/sys/debug endpoint reveals comprehensive system debug information including host operating system details, kernel version, hardware specifications, and storage configuration. Furthermore, the endpoints return distinct error messages that enable attackers to perform file existence enumeration on arbitrary paths in the underlying host filesystem. This combination of information disclosure vectors can be leveraged by attackers to perform detailed reconnaissance on the target system, identify potential weaknesses, and plan subsequent targeted attacks. The vulnerability does not require authentication, user interaction, or privileges, and can be exploited remotely over the network. Although no public exploits are known, the vulnerability’s characteristics make it a significant risk for information leakage. The CVSS 4.0 vector indicates network attack vector, low attack complexity, no privileges or user interaction required, and low impact on confidentiality, with no impact on integrity or availability.
Potential Impact
For European organizations deploying CasaOS, this vulnerability poses a risk of sensitive information leakage that could facilitate further attacks. Disclosure of configuration files and installed applications can reveal system architecture and software versions, aiding attackers in identifying exploitable components. The debug information leak provides detailed host environment data, which can be used to tailor exploits or pivot within the network. This is particularly concerning for organizations using CasaOS in critical infrastructure, small and medium enterprises, or home office environments where CasaOS may manage storage or IoT devices. The ability to enumerate file existence can also expose sensitive files or credentials stored on the host. While the vulnerability does not directly allow code execution or data modification, the reconnaissance advantage it grants can lead to more severe compromises. Given the growing adoption of CasaOS in Europe, especially in Germany, France, and the Netherlands where smart home and small business NAS solutions are popular, the impact could be significant if left unmitigated.
Mitigation Recommendations
Organizations should immediately upgrade CasaOS to a version beyond 0.4.15 once patches become available that enforce proper authorization on these endpoints. Until patches are released, network-level mitigations should be applied: restrict access to CasaOS management interfaces to trusted internal networks or VPNs, and implement firewall rules blocking external access to the vulnerable API endpoints. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting /v1/users/image and /v1/sys/debug endpoints. Conduct thorough audits of CasaOS deployments to identify exposed instances and monitor logs for unusual access patterns or repeated file enumeration attempts. Additionally, consider isolating CasaOS hosts from critical network segments to limit lateral movement if compromise occurs. Security teams should also educate users on the risks of exposing CasaOS interfaces publicly and enforce strong network segmentation. Finally, maintain up-to-date backups and incident response plans in case follow-up attacks succeed.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.567Z
- Cvss Version
- null
- State
- REJECTED
Threat ID: 6957f5dddb813ff03ef50c96
Added to database: 1/2/2026, 4:44:13 PM
Last enriched: 1/10/2026, 12:13:54 AM
Last updated: 2/7/2026, 2:27:40 PM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.