Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64422: CWE-770: Allocation of Resources Without Limits or Throttling in coollabsio coolify

0
Medium
VulnerabilityCVE-2025-64422cvecve-2025-64422cwe-770
Published: Mon Jan 05 2026 (01/05/2026, 20:29:34 UTC)
Source: CVE Database V5
Vendor/Project: coollabsio
Product: coolify

Description

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In Coolify vstarting with version 4.0.0-beta.434, the /login endpoint advertises a rate limit of 5 requests but can be trivially bypassed by rotating the X-Forwarded-For header. This enables unlimited credential stuffing and brute-force attempts against user and admin accounts. As of time of publication, it is unclear if a patch is available.

AI-Powered Analysis

AILast updated: 01/05/2026, 20:52:10 UTC

Technical Analysis

CVE-2025-64422 is a vulnerability classified under CWE-770, indicating allocation of resources without limits or throttling, found in Coolify versions starting from 4.0.0-beta.434. Coolify is an open-source, self-hosted platform used for managing servers, applications, and databases. The vulnerability resides in the /login endpoint, which advertises a rate limit of 5 login attempts to prevent brute-force attacks. However, this rate limiting can be trivially bypassed by manipulating the X-Forwarded-For HTTP header, which is commonly used to identify the originating IP address of a client connecting through a proxy or load balancer. By rotating or spoofing this header, an attacker can circumvent the rate limit and perform unlimited login attempts. This flaw enables credential stuffing and brute-force attacks against both user and administrative accounts without requiring authentication or user interaction. The CVSS 4.0 base score is 5.5 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and limited impact on availability. No patch or fix is currently available, and no known exploits have been reported in the wild. This vulnerability poses a risk of unauthorized access, potentially compromising confidentiality and integrity of managed systems and data within Coolify environments.

Potential Impact

For European organizations, this vulnerability presents a significant risk to the security of server and application management infrastructure. Coolify is used to manage critical resources such as servers, applications, and databases, so successful brute-force attacks could lead to unauthorized access to administrative accounts, enabling attackers to manipulate or disrupt services, exfiltrate sensitive data, or deploy further attacks. The bypass of rate limiting increases the likelihood of successful credential stuffing attacks, especially if weak or reused passwords are present. This could lead to data breaches, service outages, and loss of trust. Organizations with internet-facing Coolify instances are particularly vulnerable. The impact extends to confidentiality and integrity, as attackers gaining access could alter configurations or access sensitive information. Availability impact is limited but possible if attackers disrupt services post-compromise. The medium CVSS score reflects these considerations but the ease of exploitation and lack of required privileges heighten the urgency for mitigation.

Mitigation Recommendations

1. Implement robust rate limiting that cannot be bypassed by header manipulation; specifically, do not rely solely on the X-Forwarded-For header for client IP identification. 2. Configure Coolify or the underlying web server to validate and sanitize incoming headers to prevent spoofing. 3. Deploy Web Application Firewalls (WAFs) with anomaly detection capabilities to identify and block unusual login patterns or rapid repeated attempts from varying IP addresses. 4. Enforce strong password policies and encourage multi-factor authentication (MFA) for all user accounts, especially administrative ones. 5. Monitor login logs for suspicious activity, such as high volumes of failed login attempts or unusual IP address patterns. 6. Isolate Coolify management interfaces behind VPNs or internal networks where possible to reduce exposure. 7. Stay informed about updates from Coolify developers and apply patches promptly once available. 8. Consider implementing account lockout policies after a threshold of failed login attempts to further hinder brute-force attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-03T22:12:51.364Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695c211f3839e441758f3419

Added to database: 1/5/2026, 8:37:51 PM

Last enriched: 1/5/2026, 8:52:10 PM

Last updated: 1/8/2026, 1:13:43 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats