Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.445, parameters coming from docker-compose.yaml are not sanitized when used in commands. If a victim user creates an application from an attacker repository (using build pack "docker compose"), the attacker can execute commands on the Coolify instance as root. Version 4.0.0-beta.445 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/coollabsio/coolify/commit/f86ccfaa9af572a5487da8ea46b0a125a4854cf6 | Patch |
| https://github.com/coollabsio/coolify/security/advisories/GHSA-234r-xrrg-m8f3 | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-01-05 20:16
Updated : 2026-01-12 14:38
NVD link : CVE-2025-64419
Mitre link : CVE-2025-64419
CVE.ORG link : CVE-2025-64419
JSON object : View
Products Affected
coollabs
- coolify
CWE
CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
