Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in the File Storage Directory Mount Path functionality allows users with application/service management permissions to execute arbitrary commands as root on managed servers. The file_storage_directory_source parameter is passed directly to shell commands without proper sanitization, enabling full remote code execution on the host system. Version 4.0.0-beta.451 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/0xrakan/coolify-cve-2025-66209-66213 | Exploit Third Party Advisory |
| https://github.com/coollabsio/coolify/pull/7375 | Issue Tracking Patch |
| https://github.com/coollabsio/coolify/releases/tag/v4.0.0-beta.451 | Release Notes |
| https://github.com/coollabsio/coolify/security/advisories/GHSA-cj2c-9jx8-j427 |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-12-23 22:15
Updated : 2026-01-06 16:15
NVD link : CVE-2025-66213
Mitre link : CVE-2025-66213
CVE.ORG link : CVE-2025-66213
JSON object : View
Products Affected
coollabs
- coolify
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
