CVE-2025-34159: CWE-94 Improper Control of Generation of Code ('Code Injection') in coolLabs Technologies Coolify
Coolify versions prior to v4.0.0-beta.420.6 are vulnerable to a remote code execution vulnerability in the application deployment workflow. The platform allows authenticated users, with low-level member privileges, to inject arbitrary Docker Compose directives during project creation. By crafting a malicious service definition that mounts the host root filesystem, an attacker can gain full root access to the underlying server.
AI Analysis
Technical Summary
CVE-2025-34159 is a remote code execution vulnerability affecting Coolify, an open-source application deployment platform by coolLabs Technologies. The flaw exists in versions prior to v4.0.0-beta.420.6 and arises from improper control over code generation (CWE-94) and insufficient input validation (CWE-20) in the deployment workflow. Specifically, authenticated users with low-level member privileges can inject arbitrary Docker Compose directives during project creation. This injection allows an attacker to define a malicious service that mounts the host's root filesystem into the container environment. By doing so, the attacker can bypass container isolation and escalate privileges to gain full root access on the underlying host server. The vulnerability requires no user interaction and no elevated privileges beyond low-level membership, significantly lowering the bar for exploitation. The CVSS 4.0 base score is 9.4 (critical), reflecting network attack vector, low attack complexity, no authentication needed beyond low privileges, and high impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild, the vulnerability poses a severe risk to any Coolify deployment, especially in multi-tenant or shared environments where low-level users exist. The lack of available patches at the time of disclosure necessitates immediate risk mitigation through configuration changes or access restrictions.
Potential Impact
For European organizations, the impact of this vulnerability is substantial. Coolify is used to streamline application deployment, often in cloud or hybrid environments. Exploitation can lead to full root compromise of deployment servers, resulting in complete loss of confidentiality, integrity, and availability of hosted applications and data. Attackers could deploy malicious containers, exfiltrate sensitive data, disrupt services, or pivot to other internal systems. Organizations in sectors with stringent data protection regulations, such as finance, healthcare, and government, face heightened risks including regulatory penalties and reputational damage. The ease of exploitation by low-privilege authenticated users increases the threat from insider attackers or compromised accounts. Additionally, the vulnerability could be leveraged in supply chain attacks if Coolify is used to deploy software to multiple downstream environments. Given the criticality and potential for widespread impact, European entities using Coolify must prioritize remediation to maintain operational security and compliance.
Mitigation Recommendations
1. Upgrade Coolify to version v4.0.0-beta.420.6 or later as soon as a patch is available to eliminate the vulnerability. 2. Until patches are released, restrict project creation and deployment permissions to trusted users only, removing low-level member privileges from untrusted accounts. 3. Implement strict input validation and sanitization on Docker Compose directives if customization is necessary, to prevent arbitrary code injection. 4. Employ network segmentation and host-based access controls to limit the impact of a compromised deployment server. 5. Monitor deployment workflows and container configurations for suspicious service definitions that attempt to mount host filesystems. 6. Use container runtime security tools to detect and block privilege escalation attempts. 7. Conduct regular audits of user privileges and deployment activities to identify and respond to anomalous behavior promptly. 8. Educate developers and DevOps teams about the risks of code injection in deployment pipelines and enforce secure coding and deployment practices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy, Spain, Poland
CVE-2025-34159: CWE-94 Improper Control of Generation of Code ('Code Injection') in coolLabs Technologies Coolify
Description
Coolify versions prior to v4.0.0-beta.420.6 are vulnerable to a remote code execution vulnerability in the application deployment workflow. The platform allows authenticated users, with low-level member privileges, to inject arbitrary Docker Compose directives during project creation. By crafting a malicious service definition that mounts the host root filesystem, an attacker can gain full root access to the underlying server.
AI-Powered Analysis
Technical Analysis
CVE-2025-34159 is a remote code execution vulnerability affecting Coolify, an open-source application deployment platform by coolLabs Technologies. The flaw exists in versions prior to v4.0.0-beta.420.6 and arises from improper control over code generation (CWE-94) and insufficient input validation (CWE-20) in the deployment workflow. Specifically, authenticated users with low-level member privileges can inject arbitrary Docker Compose directives during project creation. This injection allows an attacker to define a malicious service that mounts the host's root filesystem into the container environment. By doing so, the attacker can bypass container isolation and escalate privileges to gain full root access on the underlying host server. The vulnerability requires no user interaction and no elevated privileges beyond low-level membership, significantly lowering the bar for exploitation. The CVSS 4.0 base score is 9.4 (critical), reflecting network attack vector, low attack complexity, no authentication needed beyond low privileges, and high impact on confidentiality, integrity, and availability. Although no known exploits have been reported in the wild, the vulnerability poses a severe risk to any Coolify deployment, especially in multi-tenant or shared environments where low-level users exist. The lack of available patches at the time of disclosure necessitates immediate risk mitigation through configuration changes or access restrictions.
Potential Impact
For European organizations, the impact of this vulnerability is substantial. Coolify is used to streamline application deployment, often in cloud or hybrid environments. Exploitation can lead to full root compromise of deployment servers, resulting in complete loss of confidentiality, integrity, and availability of hosted applications and data. Attackers could deploy malicious containers, exfiltrate sensitive data, disrupt services, or pivot to other internal systems. Organizations in sectors with stringent data protection regulations, such as finance, healthcare, and government, face heightened risks including regulatory penalties and reputational damage. The ease of exploitation by low-privilege authenticated users increases the threat from insider attackers or compromised accounts. Additionally, the vulnerability could be leveraged in supply chain attacks if Coolify is used to deploy software to multiple downstream environments. Given the criticality and potential for widespread impact, European entities using Coolify must prioritize remediation to maintain operational security and compliance.
Mitigation Recommendations
1. Upgrade Coolify to version v4.0.0-beta.420.6 or later as soon as a patch is available to eliminate the vulnerability. 2. Until patches are released, restrict project creation and deployment permissions to trusted users only, removing low-level member privileges from untrusted accounts. 3. Implement strict input validation and sanitization on Docker Compose directives if customization is necessary, to prevent arbitrary code injection. 4. Employ network segmentation and host-based access controls to limit the impact of a compromised deployment server. 5. Monitor deployment workflows and container configurations for suspicious service definitions that attempt to mount host filesystems. 6. Use container runtime security tools to detect and block privilege escalation attempts. 7. Conduct regular audits of user privileges and deployment activities to identify and respond to anomalous behavior promptly. 8. Educate developers and DevOps teams about the risks of code injection in deployment pipelines and enforce secure coding and deployment practices.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.565Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68af3a3bad5a09ad0064220d
Added to database: 8/27/2025, 5:02:51 PM
Last enriched: 11/19/2025, 4:09:59 AM
Last updated: 12/4/2025, 5:47:20 PM
Views: 107
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14012: SQL Injection in JIZHICMS
MediumCVE-2025-14011: SQL Injection in JIZHICMS
MediumCVE-2025-66373: n/a
UnknownCVE-2025-66287: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') in Red Hat Red Hat Enterprise Linux 6
HighCVE-2025-63364: n/a
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.