CVE-2025-59158: CWE-116: Improper Encoding or Escaping of Output in coollabsio coolify
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Coolify versions prior to and including v4.0.0-beta.420.6 are vulnerable to a stored cross-site scripting (XSS) attack in the project creation workflow. An authenticated user with low privileges (e.g., member role) can create a project with a maliciously crafted name containing embedded JavaScript. When an administrator later attempts to delete the project or its associated resource, the payload automatically executes in the admin’s browser context. Version 4.0.0-beta.420.7 contains a patch for the issue.
AI Analysis
Technical Summary
CVE-2025-59158 is a stored cross-site scripting (XSS) vulnerability identified in Coolify, an open-source and self-hostable platform designed for managing servers, applications, and databases. The flaw exists in versions prior to and including 4.0.0-beta.420.6 due to improper encoding or escaping of output (CWE-116) in the project creation workflow. Specifically, an authenticated user with low privileges, such as a member role, can create a project with a name containing malicious JavaScript code. This payload is stored persistently within the application. When an administrator later attempts to delete the project or its associated resources, the malicious script executes automatically in the administrator’s browser context. This execution can lead to session hijacking, credential theft, or unauthorized actions performed with administrative privileges. The vulnerability does not require the attacker to have admin rights initially, nor does it require additional user interaction beyond the admin performing standard management operations. The vulnerability is remotely exploitable over the network without complex attack vectors, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H). The high CVSS score of 9.4 reflects the critical nature of this vulnerability, emphasizing its potential to compromise confidentiality, integrity, and availability of the affected systems. The issue was addressed and patched in Coolify version 4.0.0-beta.420.7, which properly encodes or escapes output to prevent script injection.
Potential Impact
For European organizations using Coolify to manage their infrastructure, this vulnerability presents a significant risk. An attacker with low-level access can escalate their impact by injecting malicious scripts that execute in the context of administrators, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of critical services, and lateral movement within the network. The stored XSS can facilitate theft of admin credentials or session tokens, enabling persistent unauthorized access. Given that Coolify is used to manage servers, applications, and databases, exploitation could lead to widespread operational disruption and data breaches. The impact is especially critical for organizations in sectors with strict data protection regulations such as GDPR, where unauthorized access or data leakage can lead to severe legal and financial penalties. Additionally, the vulnerability could be leveraged as a foothold for further attacks, including deployment of ransomware or espionage activities. The lack of known exploits in the wild currently reduces immediate threat but does not diminish the urgency for remediation due to the ease of exploitation and high severity.
Mitigation Recommendations
European organizations should immediately upgrade all Coolify instances to version 4.0.0-beta.420.7 or later to apply the official patch that fixes the improper output encoding. Until the upgrade can be performed, organizations should restrict project creation permissions to trusted users only, minimizing the risk of malicious project names being introduced. Implement strict input validation and output encoding at the application layer to prevent injection of executable scripts. Administrators should be trained to recognize suspicious project names and avoid interacting with untrusted projects. Employ Content Security Policy (CSP) headers to reduce the impact of XSS by restricting script execution sources. Regularly audit user roles and permissions to ensure least privilege principles are enforced. Monitor logs for unusual administrative actions or project creations. Consider isolating Coolify administrative interfaces behind VPNs or zero-trust network access to limit exposure. Finally, maintain an incident response plan to quickly address any suspected exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Italy, Spain
CVE-2025-59158: CWE-116: Improper Encoding or Escaping of Output in coollabsio coolify
Description
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Coolify versions prior to and including v4.0.0-beta.420.6 are vulnerable to a stored cross-site scripting (XSS) attack in the project creation workflow. An authenticated user with low privileges (e.g., member role) can create a project with a maliciously crafted name containing embedded JavaScript. When an administrator later attempts to delete the project or its associated resource, the payload automatically executes in the admin’s browser context. Version 4.0.0-beta.420.7 contains a patch for the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-59158 is a stored cross-site scripting (XSS) vulnerability identified in Coolify, an open-source and self-hostable platform designed for managing servers, applications, and databases. The flaw exists in versions prior to and including 4.0.0-beta.420.6 due to improper encoding or escaping of output (CWE-116) in the project creation workflow. Specifically, an authenticated user with low privileges, such as a member role, can create a project with a name containing malicious JavaScript code. This payload is stored persistently within the application. When an administrator later attempts to delete the project or its associated resources, the malicious script executes automatically in the administrator’s browser context. This execution can lead to session hijacking, credential theft, or unauthorized actions performed with administrative privileges. The vulnerability does not require the attacker to have admin rights initially, nor does it require additional user interaction beyond the admin performing standard management operations. The vulnerability is remotely exploitable over the network without complex attack vectors, as indicated by the CVSS vector (AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H). The high CVSS score of 9.4 reflects the critical nature of this vulnerability, emphasizing its potential to compromise confidentiality, integrity, and availability of the affected systems. The issue was addressed and patched in Coolify version 4.0.0-beta.420.7, which properly encodes or escapes output to prevent script injection.
Potential Impact
For European organizations using Coolify to manage their infrastructure, this vulnerability presents a significant risk. An attacker with low-level access can escalate their impact by injecting malicious scripts that execute in the context of administrators, potentially leading to full system compromise. This can result in unauthorized access to sensitive data, disruption of critical services, and lateral movement within the network. The stored XSS can facilitate theft of admin credentials or session tokens, enabling persistent unauthorized access. Given that Coolify is used to manage servers, applications, and databases, exploitation could lead to widespread operational disruption and data breaches. The impact is especially critical for organizations in sectors with strict data protection regulations such as GDPR, where unauthorized access or data leakage can lead to severe legal and financial penalties. Additionally, the vulnerability could be leveraged as a foothold for further attacks, including deployment of ransomware or espionage activities. The lack of known exploits in the wild currently reduces immediate threat but does not diminish the urgency for remediation due to the ease of exploitation and high severity.
Mitigation Recommendations
European organizations should immediately upgrade all Coolify instances to version 4.0.0-beta.420.7 or later to apply the official patch that fixes the improper output encoding. Until the upgrade can be performed, organizations should restrict project creation permissions to trusted users only, minimizing the risk of malicious project names being introduced. Implement strict input validation and output encoding at the application layer to prevent injection of executable scripts. Administrators should be trained to recognize suspicious project names and avoid interacting with untrusted projects. Employ Content Security Policy (CSP) headers to reduce the impact of XSS by restricting script execution sources. Regularly audit user roles and permissions to ensure least privilege principles are enforced. Monitor logs for unusual administrative actions or project creations. Consider isolating Coolify administrative interfaces behind VPNs or zero-trust network access to limit exposure. Finally, maintain an incident response plan to quickly address any suspected exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-09-09T15:23:16.327Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695bfa903839e441756fd45b
Added to database: 1/5/2026, 5:53:20 PM
Last enriched: 1/5/2026, 6:07:11 PM
Last updated: 1/8/2026, 2:27:24 PM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-21895: CWE-703: Improper Check or Handling of Exceptional Conditions in RustCrypto RSA
LowCVE-2025-8307: CWE-257 Storing Passwords in a Recoverable Format in Asseco InfoMedica Plus
MediumCVE-2025-8306: CWE-1220 Insufficient Granularity of Access Control in Asseco InfoMedica Plus
MediumCVE-2025-14025: Incorrect Execution-Assigned Permissions in Red Hat Red Hat Ansible Automation Platform 2
HighCVE-2026-21891: CWE-287: Improper Authentication in IceWhaleTech ZimaOS
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.