CasaOS versions up to and including 0.4.15 expose multiple unauthenticated endpoints that allow remote attackers to retrieve sensitive configuration files and system debug information. The /v1/users/image endpoint can be abused with a user-controlled path parameter to access files under /var/lib/casaos/1/, which reveals installed applications and configuration details. Additionally, /v1/sys/debug discloses host operating system, kernel, hardware, and storage information. The endpoints also return distinct error messages, enabling file existence enumeration of arbitrary paths on the underlying host filesystem. This information disclosure can be used for reconnaissance and to facilitate targeted follow-up attacks against services deployed on the host.
History

Mon, 05 Jan 2026 10:45:00 +0000

Type Values Removed Values Added
First Time appeared Icewhale
Icewhale casaos
Vendors & Products Icewhale
Icewhale casaos

Sat, 03 Jan 2026 21:30:00 +0000

Type Values Removed Values Added
Description This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure. CasaOS versions up to and including 0.4.15 expose multiple unauthenticated endpoints that allow remote attackers to retrieve sensitive configuration files and system debug information. The /v1/users/image endpoint can be abused with a user-controlled path parameter to access files under /var/lib/casaos/1/, which reveals installed applications and configuration details. Additionally, /v1/sys/debug discloses host operating system, kernel, hardware, and storage information. The endpoints also return distinct error messages, enabling file existence enumeration of arbitrary paths on the underlying host filesystem. This information disclosure can be used for reconnaissance and to facilitate targeted follow-up attacks against services deployed on the host.
Title CasaOS <= 0.4.15 Unauthenticated File and Debug Data Exposure
Weaknesses CWE-497
CWE-862
References
Metrics cvssV4_0

{'score': 6.9, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N'}


Fri, 02 Jan 2026 16:45:00 +0000

Type Values Removed Values Added
Description This CVE ID was rejected because it was reserved but not used for a vulnerability disclosure.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-03T21:18:51.053Z

Reserved: 2025-04-15T19:15:22.567Z

Link: CVE-2025-34171

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-02T17:15:45.897

Modified: 2026-01-03T22:15:45.840

Link: CVE-2025-34171

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-05T10:13:33Z