Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 13 Apr 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zimaspace
Zimaspace zimaos |
|
| CPEs | cpe:2.3:o:zimaspace:zimaos:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zimaspace
Zimaspace zimaos |
Tue, 07 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Icewhaletech
Icewhaletech zimaos |
|
| Vendors & Products |
Icewhaletech
Icewhaletech zimaos |
Mon, 06 Apr 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 03 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. Prior to version 1.5.3, a proxy endpoint (/v1/sys/proxy) exposed by ZimaOS's web interface can be abused (via an externally reachable domain using a Cloudflare Tunnel) to make requests to internal localhost services. This results in unauthenticated access to internal-only endpoints and sensitive local services when the product is reachable from the Internet through a Cloudflare Tunnel. This issue has been patched in version 1.5.3. | |
| Title | Arbitrary internal service access via /v1/sys/proxy when Cloudflare Tunnel is enabled on ZimaOS | |
| Weaknesses | CWE-918 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-04-06T15:42:48.777Z
Reserved: 2026-03-03T14:25:19.245Z
Link: CVE-2026-28798
Updated: 2026-04-06T15:40:12.501Z
Status : Analyzed
Published: 2026-04-03T20:16:02.433
Modified: 2026-04-13T18:27:54.580
Link: CVE-2026-28798
No data.
OpenCVE Enrichment
Updated: 2026-04-14T16:41:49Z