Coolify versions prior to v4.0.0-beta.420.6 are vulnerable to a stored cross-site scripting (XSS) attack in the project creation workflow. An authenticated user with low privileges can create a project with a maliciously crafted name containing embedded JavaScript. When an administrator attempts to delete the project or its associated resource, the payload executes in the admin’s browser context. This results in full compromise of the Coolify instance, including theft of API tokens, session cookies, and access to WebSocket-based terminal sessions on managed servers.
References
| Link | Resource |
|---|---|
| https://coolify.io/ | Product |
| https://github.com/Eyodav/CVE-2025-34157 | Third Party Advisory |
| https://github.com/coollabsio/coolify/releases/tag/v4.0.0-beta.420.7 | Release Notes |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-08-27 17:15
Updated : 2025-09-19 16:48
NVD link : CVE-2025-34157
Mitre link : CVE-2025-34157
CVE.ORG link : CVE-2025-34157
JSON object : View
Products Affected
coollabs
- coolify
