Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.420.7, the Git Repository field during project creation is vulnerable to command injection. User input is not properly sanitized, allowing attackers to inject arbitrary shell commands that execute on the underlying server during the deployment workflow. A regular member user can exploit this vulnerability. Version 4.0.0-beta.420.7 contains a patch for the issue.
References
| Link | Resource |
|---|---|
| https://github.com/coollabsio/coolify/security/advisories/GHSA-5cg9-38qj-8mc3 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-01-05 18:15
Updated : 2026-01-12 15:02
NVD link : CVE-2025-59157
Mitre link : CVE-2025-59157
CVE.ORG link : CVE-2025-59157
JSON object : View
Products Affected
coollabs
- coolify
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
