CVE-2025-34171

Source: disclosure@vulncheck.com

MEDIUM
6.9
Published: January 2, 2026 at 05:15 PM
Modified: January 8, 2026 at 06:09 PM

Vulnerability Description

CasaOS versions up to and including 0.4.15 expose multiple unauthenticated endpoints that allow remote attackers to retrieve sensitive configuration files and system debug information. The /v1/users/image endpoint can be abused with a user-controlled path parameter to access files under /var/lib/casaos/1/, which reveals installed applications and configuration details. Additionally, /v1/sys/debug discloses host operating system, kernel, hardware, and storage information. The endpoints also return distinct error messages, enabling file existence enumeration of arbitrary paths on the underlying host filesystem. This information disclosure can be used for reconnaissance and to facilitate targeted follow-up attacks against services deployed on the host.

CVSS Metrics

Base Score
6.9
Severity
MEDIUM
Vector String
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Weaknesses (CWE)

Source: disclosure@vulncheck.com

AI Security Analysis

01 // Technical Summary

CasaOS versions 0.4.15 and below are vulnerable to critical information disclosure, allowing attackers to remotely access sensitive configuration files and system debug information. This vulnerability enables attackers to gather crucial details about the host system, including installed applications, operating system details, and storage information, facilitating further attacks. Successful exploitation can lead to complete system compromise.

02 // Vulnerability Mechanism

Step 1: Reconnaissance: The attacker identifies a vulnerable CasaOS instance (version <= 0.4.15) accessible from the network.

Step 2: Information Gathering via /v1/users/image: The attacker crafts a malicious request to the /v1/users/image endpoint, providing a path parameter that points to a sensitive configuration file (e.g., /var/lib/casaos/1/apps.db).

Step 3: File Retrieval: The CasaOS server, due to the lack of input validation, processes the request and retrieves the contents of the specified file.

Step 4: Information Gathering via /v1/sys/debug: The attacker sends a request to the /v1/sys/debug endpoint.

Step 5: System Information Disclosure: The CasaOS server returns detailed system information, including OS version, kernel version, hardware details, and storage configuration.

Step 6: File Existence Enumeration: The attacker uses the distinct error messages returned by both endpoints to determine the existence of specific files on the system, further refining their reconnaissance efforts.

Step 7: Subsequent Attacks: The attacker uses the gathered information to plan and execute follow-up attacks, such as credential harvesting, privilege escalation, or lateral movement, targeting other services or systems on the host or network.

03 // Deep Technical Analysis

The vulnerability stems from insufficient input validation and access control on multiple unauthenticated endpoints within CasaOS. Specifically, the /v1/users/image endpoint fails to properly sanitize the path parameter, allowing attackers to traverse the filesystem and retrieve arbitrary files under /var/lib/casaos/1/. This path traversal vulnerability, combined with the lack of authentication, enables attackers to read sensitive configuration files. The /v1/sys/debug endpoint further exacerbates the issue by exposing detailed system information, including the operating system, kernel version, hardware details, and storage configuration. The distinct error messages returned by these endpoints also allow for file existence enumeration, enabling attackers to identify specific files and directories on the host filesystem, further aiding in reconnaissance. The root cause is a lack of proper input validation and authorization checks, allowing attackers to bypass security controls and access sensitive information.

04 // Exploitation Status

Public PoC. Exploits are likely to be readily available and easily adaptable. The vulnerability is highly exploitable due to its simplicity and the sensitive information disclosed.

05 // Threat Intelligence

Likely to be exploited by a wide range of threat actors, including opportunistic attackers, ransomware groups, and potentially APTs seeking initial access. CISA KEV status: Likely to be added due to the ease of exploitation and potential for significant impact.

06 // Detection & Hunting

  • Network traffic analysis: Look for requests to /v1/users/image with unusual path parameters, especially those traversing the filesystem (e.g., using ../).

  • Network traffic analysis: Look for requests to /v1/sys/debug.

  • Log analysis: Examine CasaOS server logs for suspicious activity, such as unauthorized file access attempts or unusual error messages.

  • File integrity monitoring: Monitor critical configuration files for unauthorized modifications.

  • Endpoint Detection and Response (EDR): Implement EDR solutions to detect and respond to malicious activity, such as file access attempts and suspicious network connections.

07 // Remediation & Hardening

  • Upgrade to CasaOS version 0.4.16 or later, which includes a fix for this vulnerability.

  • Implement input validation and sanitization on all user-supplied input, especially the path parameter in the /v1/users/image endpoint.

  • Implement proper access control and authentication mechanisms for all endpoints, ensuring that only authorized users can access sensitive information.

  • Restrict access to the CasaOS web interface to only trusted networks or users.

  • Regularly review and update security configurations and patches.

  • Implement a Web Application Firewall (WAF) to filter malicious requests.

  • Monitor system logs for suspicious activity and security events.

08 // Affected Products

CasaOS versions up to and including 0.4.15
Advertisement