Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64427: CWE-918: Server-Side Request Forgery (SSRF) in IceWhaleTech ZimaOS

0
High
VulnerabilityCVE-2025-64427cvecve-2025-64427cwe-918cwe-200
Published: Mon Mar 02 2026 (03/02/2026, 16:28:42 UTC)
Source: CVE Database V5
Vendor/Project: IceWhaleTech
Product: ZimaOS

Description

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.5.0 and prior, due to insufficient validation or restriction of target URLs, an authenticated local user can craft requests that target internal IP addresses (e.g., 127.0.0.1, localhost, or private network ranges). This allows the attacker to interact with internal HTTP/HTTPS services that are not intended to be exposed externally or to local users. No known patch is publicly available.

AI-Powered Analysis

AILast updated: 03/02/2026, 16:45:57 UTC

Technical Analysis

CVE-2025-64427 is a Server-Side Request Forgery (SSRF) vulnerability identified in IceWhaleTech's ZimaOS, a fork of CasaOS designed for Zima devices and x86-64 systems with UEFI. The vulnerability exists in versions prior to 1.5.0 due to insufficient validation or restriction of URLs that authenticated local users can request. Specifically, the system fails to properly restrict requests to internal IP addresses such as 127.0.0.1, localhost, or private network ranges (e.g., 10.x.x.x, 192.168.x.x). This flaw allows an attacker with local authentication privileges to craft HTTP or HTTPS requests that interact with internal services not intended for exposure to local users or external networks. These internal services may contain sensitive information or administrative interfaces, leading to potential unauthorized data disclosure. The vulnerability does not require user interaction beyond authentication, and the attack complexity is low, making exploitation feasible for any authenticated local user. The CVSS 3.1 score of 7.1 reflects a high severity with a network attack vector, low complexity, privileges required, no user interaction, and high confidentiality impact but no integrity or availability impact. No public patch or fix is currently available, increasing the urgency for mitigation. While no known exploits are reported in the wild, the vulnerability poses a significant risk to affected systems due to the sensitive nature of internal services that could be accessed.

Potential Impact

The primary impact of CVE-2025-64427 is unauthorized disclosure of sensitive information from internal services that are not intended to be accessible by local users or external entities. Attackers with authenticated local access can leverage this SSRF vulnerability to probe internal network services, potentially extracting confidential data or gaining further footholds within the system. Although the vulnerability does not directly affect system integrity or availability, the confidentiality breach could lead to further attacks such as privilege escalation or lateral movement within an organization's network. Organizations deploying ZimaOS on Zima devices or compatible x86-64 systems may face risks of internal service exposure, especially if internal services contain administrative or sensitive data endpoints. The lack of a public patch increases the window of exposure, and attackers with local access could exploit this vulnerability to bypass network segmentation or firewall protections. This threat is particularly concerning for environments where multiple users have local access or where local user accounts are less strictly controlled. The overall impact is high due to the potential for sensitive data leakage and the ease of exploitation by authenticated users.

Mitigation Recommendations

To mitigate CVE-2025-64427, organizations should implement several specific measures beyond generic best practices: 1) Restrict and monitor local user access strictly, ensuring only trusted users have authenticated local accounts on ZimaOS systems. 2) Employ network segmentation and firewall rules to limit internal service exposure, even from local hosts, reducing the attack surface for SSRF exploitation. 3) Use application-layer filtering or proxy solutions that validate and restrict outgoing requests from local users to internal IP ranges. 4) Monitor logs and network traffic for unusual internal requests originating from local user accounts, which may indicate SSRF exploitation attempts. 5) Engage with IceWhaleTech for updates or patches and apply them promptly once available. 6) If feasible, consider disabling or restricting internal HTTP/HTTPS services that are not essential or that could be targeted via SSRF. 7) Conduct regular security audits and penetration tests focusing on local user privileges and internal service exposure. 8) Educate system administrators and users about the risks of SSRF and the importance of limiting local access. These targeted mitigations can reduce the likelihood and impact of exploitation while awaiting an official patch.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-03T22:12:51.364Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a5bdaa32ffcdb8a2762eb3

Added to database: 3/2/2026, 4:41:14 PM

Last enriched: 3/2/2026, 4:45:57 PM

Last updated: 3/2/2026, 10:47:57 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses