Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in the Dynamic Proxy Configuration Filename handling allows users with application/service management permissions to execute arbitrary commands as root on managed servers. Proxy configuration filenames are passed to shell commands without proper escaping, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/0xrakan/coolify-cve-2025-66209-66213 | Exploit Third Party Advisory |
| https://github.com/coollabsio/coolify/pull/7375 | Issue Tracking Patch |
| https://github.com/coollabsio/coolify/releases/tag/v4.0.0-beta.451 | Release Notes |
| https://github.com/coollabsio/coolify/security/advisories/GHSA-q7rg-2j7p-83gp |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-12-23 22:15
Updated : 2026-01-06 16:15
NVD link : CVE-2025-66212
Mitre link : CVE-2025-66212
CVE.ORG link : CVE-2025-66212
JSON object : View
Products Affected
coollabs
- coolify
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
