Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-59156: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in coollabsio coolify

0
Critical
VulnerabilityCVE-2025-59156cvecve-2025-59156cwe-78
Published: Mon Jan 05 2026 (01/05/2026, 17:39:42 UTC)
Source: CVE Database V5
Vendor/Project: coollabsio
Product: coolify

Description

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.420.7, a Remote Code Execution (RCE)*vulnerability exists in Coolify's application deployment workflow. This flaw allows a low-privileged member to inject arbitrary Docker Compose directives during project creation or updates. By defining a malicious service that mounts the host filesystem, an attacker can achieve root-level command execution on the host OS, completely bypassing container isolation. Version 4.0.0-beta.420.7 contains a patch for the issue.

AI-Powered Analysis

AILast updated: 01/05/2026, 18:07:40 UTC

Technical Analysis

CVE-2025-59156 is a critical OS command injection vulnerability identified in Coolify, an open-source, self-hostable platform for managing servers, applications, and databases. The flaw exists in versions prior to 4.0.0-beta.420.7 within the application deployment workflow. Specifically, it allows a low-privileged user to inject arbitrary Docker Compose directives when creating or updating projects. By crafting a malicious service definition that mounts the host filesystem, an attacker can escape container isolation and execute commands with root privileges on the host operating system. This occurs because the application fails to properly sanitize or neutralize special elements in the Docker Compose input, leading to command injection (CWE-78). The vulnerability is remotely exploitable without user interaction or authentication beyond low-privileged membership, making it highly accessible. The CVSS 4.0 vector (AV:N/AC:L/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) reflects network attack vector, low complexity, no user interaction, and high impact on confidentiality, integrity, and availability. Although no public exploits are reported yet, the potential for full host compromise is significant. The issue is patched in version 4.0.0-beta.420.7, which properly sanitizes inputs and restricts Docker Compose directive injection.

Potential Impact

For European organizations, this vulnerability poses a severe risk, especially those deploying Coolify in multi-tenant or collaborative environments. An attacker with low privileges can escalate to full root access on the host, compromising all hosted applications, data, and infrastructure. This could lead to data breaches, service disruption, lateral movement within networks, and potential deployment of ransomware or other malware. Organizations relying on Coolify for critical infrastructure management may face operational downtime and reputational damage. Given the high severity and ease of exploitation, the threat is particularly acute for sectors with stringent data protection requirements such as finance, healthcare, and government. The ability to bypass container isolation undermines a key security boundary, increasing the attack surface and complicating incident response.

Mitigation Recommendations

1. Immediately upgrade all Coolify instances to version 4.0.0-beta.420.7 or later to apply the official patch. 2. Restrict project creation and update permissions to trusted, high-privileged users only, minimizing the risk of malicious Docker Compose injection. 3. Implement strict input validation and sanitization on any user-supplied configuration data related to Docker Compose files. 4. Monitor Docker Compose configurations and deployment workflows for unauthorized or suspicious changes using file integrity monitoring and audit logging. 5. Employ container runtime security tools that can detect and prevent host filesystem mounts or privilege escalations. 6. Conduct regular security assessments and penetration tests focusing on container escape vectors. 7. Isolate Coolify management interfaces behind strong network controls and multi-factor authentication to reduce exposure. 8. Educate administrators and developers about the risks of improper configuration and the importance of applying security patches promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-09-09T15:23:16.327Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695bfa903839e441756fd455

Added to database: 1/5/2026, 5:53:20 PM

Last enriched: 1/5/2026, 6:07:40 PM

Last updated: 1/8/2026, 12:12:34 PM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats