Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28286: CWE-73: External Control of File Name or Path in IceWhaleTech ZimaOS

0
High
VulnerabilityCVE-2026-28286cvecve-2026-28286cwe-73
Published: Mon Mar 02 2026 (03/02/2026, 16:28:39 UTC)
Source: CVE Database V5
Vendor/Project: IceWhaleTech
Product: ZimaOS

Description

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.5.2-beta3, the application enforces restrictions in the frontend/UI to prevent users from creating files or folders in internal OS paths. However, when interacting directly with the API, the restrictions are bypass-able. By sending a crafted request targeting paths like /etc, /usr, or other sensitive system directories, the API successfully creates files or directories in locations where normal users should have no write access. This indicates that the API does not properly validate the target path, allowing unauthorized operations on critical system directories. No known patch is publicly available.

AI-Powered Analysis

AILast updated: 03/02/2026, 16:45:42 UTC

Technical Analysis

CVE-2026-28286 is a vulnerability classified under CWE-73 (External Control of File Name or Path) affecting IceWhaleTech's ZimaOS, specifically version 1.5.2-beta3. ZimaOS is an operating system forked from CasaOS, designed for Zima devices and x86-64 systems with UEFI. The vulnerability stems from insufficient validation in the system's API that manages file and directory creation. While the frontend/UI enforces restrictions preventing users from creating files or folders in sensitive internal OS paths, these controls are circumvented when interacting directly with the API. Crafted API requests can specify paths such as /etc, /usr, or other critical system directories, allowing unauthorized creation of files or directories in locations that should be protected from write access by normal users. This lack of proper path validation leads to a critical security flaw where attackers with low privileges can escalate their impact by modifying or injecting files into system directories, potentially leading to privilege escalation, system compromise, or denial of service. The vulnerability has a CVSS 3.1 base score of 8.6, reflecting high impact on confidentiality, integrity, and availability, with network attack vector, high attack complexity, low privileges required, no user interaction, and scope change. No patches or fixes have been publicly released, and no known exploits have been observed in the wild as of the publication date.

Potential Impact

The vulnerability allows unauthorized users to create or modify files and directories within critical system paths, which can have severe consequences. Attackers could inject malicious scripts or binaries into system directories, leading to privilege escalation or persistent backdoors. System integrity could be compromised by overwriting configuration files or binaries, potentially causing system instability or denial of service. Confidential information stored in protected directories could be exposed or altered. The ability to write to sensitive paths without proper authorization undermines the security model of the OS and can facilitate further attacks, including lateral movement within networks. Organizations relying on ZimaOS in production environments face risks of system compromise, data breaches, and operational disruptions. The absence of a patch increases the window of exposure, especially if API endpoints are accessible externally or to untrusted users.

Mitigation Recommendations

1. Immediately restrict API access to trusted and authenticated users only, ideally limiting it to internal networks or secure VPNs. 2. Implement strict input validation and sanitization on the API server side to enforce path restrictions, ensuring that file and directory creation requests cannot target sensitive system directories. 3. Employ application-layer firewalls or API gateways to monitor and block suspicious requests attempting to access or modify protected paths. 4. Conduct thorough code reviews and security testing focusing on API endpoints handling file operations to identify and remediate similar flaws. 5. Use operating system-level mandatory access controls (e.g., SELinux, AppArmor) to enforce write restrictions on critical directories, adding a defense-in-depth layer. 6. Monitor system logs and file integrity to detect unauthorized changes in sensitive directories. 7. Engage with IceWhaleTech for updates or patches and apply them promptly once available. 8. Consider isolating ZimaOS instances or running them with minimal privileges until the vulnerability is resolved.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-26T01:52:58.735Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a5bdaa32ffcdb8a2762eb6

Added to database: 3/2/2026, 4:41:14 PM

Last enriched: 3/2/2026, 4:45:42 PM

Last updated: 3/2/2026, 11:14:55 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses