ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In versions below 1.5.0, the API endpoint `http://<Server-ip>/v1/users/name` allows unauthenticated users to access sensitive information, such as usernames, without any authorization. This vulnerability could be exploited by an attacker to enumerate usernames and leverage them for further attacks, such as brute-force or phishing campaigns. As of time of publication, no known patched versions are available.
References
| Link | Resource |
|---|---|
| https://github.com/IceWhaleTech/ZimaOS/security/advisories/GHSA-57r9-43pc-gcp2 | |
| https://github.com/IceWhaleTech/ZimaOS/security/advisories/GHSA-9mrr-px2c-w42c | Exploit Vendor Advisory |
| https://youtu.be/wJFq8cuyFm4 | Exploit |
Configurations
History
05 Nov 2025, 22:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary | (en) ZimaOS is a fork of CasaOS, an operating system for Zima devices and x86-64 systems with UEFI. In versions below 1.5.0, the API endpoint `http://<Server-ip>/v1/users/name` allows unauthenticated users to access sensitive information, such as usernames, without any authorization. This vulnerability could be exploited by an attacker to enumerate usernames and leverage them for further attacks, such as brute-force or phishing campaigns. As of time of publication, no known patched versions are available. | |
| References |
|
Information
Published : 2024-10-24 21:15
Updated : 2025-11-05 22:15
NVD link : CVE-2024-48932
Mitre link : CVE-2024-48932
CVE.ORG link : CVE-2024-48932
JSON object : View
Products Affected
zimaspace
- zimaos
