Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28442: CWE-73: External Control of File Name or Path in IceWhaleTech ZimaOS

0
High
VulnerabilityCVE-2026-28442cvecve-2026-28442cwe-73
Published: Thu Mar 05 2026 (03/05/2026, 20:38:37 UTC)
Source: CVE Database V5
Vendor/Project: IceWhaleTech
Product: ZimaOS

Description

ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In version 1.5.2-beta3, users are restricted from deleting internal system files or folders through the application interface. However, when interacting directly with the API, these restrictions can be bypassed. By altering the path parameter in the delete request, internal OS files and directories can be removed successfully. The backend processes these manipulated requests without validating whether the targeted path belongs to restricted system locations. This demonstrates improper input validation and broken access control on sensitive filesystem operations. No known public patch is available.

AI-Powered Analysis

AILast updated: 03/05/2026, 21:15:23 UTC

Technical Analysis

CVE-2026-28442 is an external control of file name or path vulnerability (CWE-73) found in IceWhaleTech's ZimaOS, a fork of CasaOS designed for Zima devices and x86-64 systems with UEFI. In version 1.5.2-beta3, the OS's application interface prevents users from deleting internal system files or folders, enforcing access controls at the UI level. However, the backend API responsible for handling delete requests fails to validate the 'path' parameter properly. By directly interacting with the API and manipulating this parameter, an attacker with low privileges can bypass UI restrictions and delete critical system files or directories. This improper input validation and broken access control on sensitive filesystem operations can lead to severe consequences, including system instability, denial of service, or potential escalation of privileges if critical components are removed. The vulnerability has a CVSS 3.1 score of 8.6 (high severity), reflecting its network attack vector, high impact on confidentiality, integrity, and availability, and the requirement for low privileges but no user interaction. Currently, no public patches or mitigations have been released by IceWhaleTech, increasing the urgency for affected users to implement compensating controls.

Potential Impact

The vulnerability allows attackers with limited privileges to delete internal OS files and directories, which can severely disrupt system operations. This can lead to denial of service by removing critical system components, potentially causing the OS to become unstable or unbootable. The deletion of sensitive files may also expose confidential information or facilitate further attacks, such as privilege escalation or persistent compromise. Organizations relying on ZimaOS for critical infrastructure or embedded devices may face operational downtime, data loss, and increased risk of targeted attacks exploiting this vulnerability. The lack of a patch and the ability to exploit remotely over the network further exacerbate the threat, making it a significant risk for any deployment of ZimaOS 1.5.2-beta3.

Mitigation Recommendations

Until an official patch is released, organizations should implement strict network segmentation and firewall rules to restrict access to the ZimaOS API endpoints, limiting them only to trusted administrators and systems. Employ strong authentication and authorization mechanisms to ensure only fully trusted users can interact with the API. Monitor API usage logs for suspicious delete requests or unusual path parameters. Consider deploying host-based intrusion detection systems (HIDS) to detect unauthorized file deletions or modifications in critical system directories. If feasible, downgrade to a previous unaffected version or isolate affected systems from production environments. Engage with IceWhaleTech for updates and apply patches immediately once available. Additionally, implement regular backups of critical system files and configurations to enable recovery in case of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-27T15:54:05.140Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a9ef11c48b3f10ff4d065e

Added to database: 3/5/2026, 9:01:05 PM

Last enriched: 3/5/2026, 9:15:23 PM

Last updated: 3/5/2026, 10:03:49 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses