CVE-2026-28798

ZimaOS · ZimaOS

ZimaOS versions prior to 1.5.3 contain a proxy endpoint vulnerability. When exposed via Cloudflare Tunnel, unauthenticated attackers can access internal localhost services and sensitive endpoints.

Executive summary

ZimaOS is vulnerable to unauthenticated access to internal services via a proxy endpoint when the system is reachable through a Cloudflare Tunnel.

Vulnerability

The /v1/sys/proxy endpoint in ZimaOS can be abused by unauthenticated attackers to proxy requests to internal services running on localhost. This occurs specifically when the OS is reachable from the internet via a Cloudflare Tunnel, bypassing intended local-only access restrictions.

Business impact

This vulnerability allows attackers to interact with sensitive internal-only management services and local APIs without authentication. The CVSS score of 9.0 indicates a critical risk of data exposure and potential system takeover by bypassing the external security perimeter provided by the tunnel.

Remediation

Immediate Action: Update ZimaOS to version 1.5.3 or later to patch the vulnerable proxy endpoint logic.

Proactive Monitoring: Review Cloudflare Tunnel logs and ZimaOS web interface logs for unusual requests directed at the /v1/sys/proxy path.

Compensating Controls: Disable the proxy endpoint if it is not required for business operations, or implement strict IP-based access controls at the Cloudflare Tunnel layer.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The ability to reach internal localhost services from the public internet is a severe security bypass. Users of ZimaOS must update to version 1.5.3 immediately. We also recommend auditing all internal services to ensure they require independent authentication, providing defense-in-depth even if a proxy bypass occurs.