CVE-2025-64422: CWE-770: Allocation of Resources Without Limits or Throttling in coollabsio coolify
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In Coolify vstarting with version 4.0.0-beta.434, the /login endpoint advertises a rate limit of 5 requests but can be trivially bypassed by rotating the X-Forwarded-For header. This enables unlimited credential stuffing and brute-force attempts against user and admin accounts. As of time of publication, it is unclear if a patch is available.
AI Analysis
Technical Summary
CVE-2025-64422 is a vulnerability classified under CWE-770, indicating allocation of resources without limits or throttling, found in Coolify versions starting from 4.0.0-beta.434. Coolify is an open-source, self-hosted platform used for managing servers, applications, and databases. The vulnerability resides in the /login endpoint, which advertises a rate limit of 5 login attempts to prevent brute-force attacks. However, this rate limiting can be trivially bypassed by manipulating the X-Forwarded-For HTTP header, which is commonly used to identify the originating IP address of a client connecting through a proxy or load balancer. By rotating or spoofing this header, an attacker can circumvent the rate limit and perform unlimited login attempts. This flaw enables credential stuffing and brute-force attacks against both user and administrative accounts without requiring authentication or user interaction. The CVSS 4.0 base score is 5.5 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and limited impact on availability. No patch or fix is currently available, and no known exploits have been reported in the wild. This vulnerability poses a risk of unauthorized access, potentially compromising confidentiality and integrity of managed systems and data within Coolify environments.
Potential Impact
For European organizations, this vulnerability presents a significant risk to the security of server and application management infrastructure. Coolify is used to manage critical resources such as servers, applications, and databases, so successful brute-force attacks could lead to unauthorized access to administrative accounts, enabling attackers to manipulate or disrupt services, exfiltrate sensitive data, or deploy further attacks. The bypass of rate limiting increases the likelihood of successful credential stuffing attacks, especially if weak or reused passwords are present. This could lead to data breaches, service outages, and loss of trust. Organizations with internet-facing Coolify instances are particularly vulnerable. The impact extends to confidentiality and integrity, as attackers gaining access could alter configurations or access sensitive information. Availability impact is limited but possible if attackers disrupt services post-compromise. The medium CVSS score reflects these considerations but the ease of exploitation and lack of required privileges heighten the urgency for mitigation.
Mitigation Recommendations
1. Implement robust rate limiting that cannot be bypassed by header manipulation; specifically, do not rely solely on the X-Forwarded-For header for client IP identification. 2. Configure Coolify or the underlying web server to validate and sanitize incoming headers to prevent spoofing. 3. Deploy Web Application Firewalls (WAFs) with anomaly detection capabilities to identify and block unusual login patterns or rapid repeated attempts from varying IP addresses. 4. Enforce strong password policies and encourage multi-factor authentication (MFA) for all user accounts, especially administrative ones. 5. Monitor login logs for suspicious activity, such as high volumes of failed login attempts or unusual IP address patterns. 6. Isolate Coolify management interfaces behind VPNs or internal networks where possible to reduce exposure. 7. Stay informed about updates from Coolify developers and apply patches promptly once available. 8. Consider implementing account lockout policies after a threshold of failed login attempts to further hinder brute-force attacks.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy
CVE-2025-64422: CWE-770: Allocation of Resources Without Limits or Throttling in coollabsio coolify
Description
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In Coolify vstarting with version 4.0.0-beta.434, the /login endpoint advertises a rate limit of 5 requests but can be trivially bypassed by rotating the X-Forwarded-For header. This enables unlimited credential stuffing and brute-force attempts against user and admin accounts. As of time of publication, it is unclear if a patch is available.
AI-Powered Analysis
Technical Analysis
CVE-2025-64422 is a vulnerability classified under CWE-770, indicating allocation of resources without limits or throttling, found in Coolify versions starting from 4.0.0-beta.434. Coolify is an open-source, self-hosted platform used for managing servers, applications, and databases. The vulnerability resides in the /login endpoint, which advertises a rate limit of 5 login attempts to prevent brute-force attacks. However, this rate limiting can be trivially bypassed by manipulating the X-Forwarded-For HTTP header, which is commonly used to identify the originating IP address of a client connecting through a proxy or load balancer. By rotating or spoofing this header, an attacker can circumvent the rate limit and perform unlimited login attempts. This flaw enables credential stuffing and brute-force attacks against both user and administrative accounts without requiring authentication or user interaction. The CVSS 4.0 base score is 5.5 (medium severity), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and limited impact on availability. No patch or fix is currently available, and no known exploits have been reported in the wild. This vulnerability poses a risk of unauthorized access, potentially compromising confidentiality and integrity of managed systems and data within Coolify environments.
Potential Impact
For European organizations, this vulnerability presents a significant risk to the security of server and application management infrastructure. Coolify is used to manage critical resources such as servers, applications, and databases, so successful brute-force attacks could lead to unauthorized access to administrative accounts, enabling attackers to manipulate or disrupt services, exfiltrate sensitive data, or deploy further attacks. The bypass of rate limiting increases the likelihood of successful credential stuffing attacks, especially if weak or reused passwords are present. This could lead to data breaches, service outages, and loss of trust. Organizations with internet-facing Coolify instances are particularly vulnerable. The impact extends to confidentiality and integrity, as attackers gaining access could alter configurations or access sensitive information. Availability impact is limited but possible if attackers disrupt services post-compromise. The medium CVSS score reflects these considerations but the ease of exploitation and lack of required privileges heighten the urgency for mitigation.
Mitigation Recommendations
1. Implement robust rate limiting that cannot be bypassed by header manipulation; specifically, do not rely solely on the X-Forwarded-For header for client IP identification. 2. Configure Coolify or the underlying web server to validate and sanitize incoming headers to prevent spoofing. 3. Deploy Web Application Firewalls (WAFs) with anomaly detection capabilities to identify and block unusual login patterns or rapid repeated attempts from varying IP addresses. 4. Enforce strong password policies and encourage multi-factor authentication (MFA) for all user accounts, especially administrative ones. 5. Monitor login logs for suspicious activity, such as high volumes of failed login attempts or unusual IP address patterns. 6. Isolate Coolify management interfaces behind VPNs or internal networks where possible to reduce exposure. 7. Stay informed about updates from Coolify developers and apply patches promptly once available. 8. Consider implementing account lockout policies after a threshold of failed login attempts to further hinder brute-force attacks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-03T22:12:51.364Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695c211f3839e441758f3419
Added to database: 1/5/2026, 8:37:51 PM
Last enriched: 1/5/2026, 8:52:10 PM
Last updated: 1/8/2026, 1:13:43 PM
Views: 19
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0719: Stack-based Buffer Overflow in Red Hat Red Hat Enterprise Linux 10
HighCVE-2025-69260: CWE-346: Origin Validation Error in Trend Micro, Inc. Trend Micro Apex Central
HighCVE-2025-69259: CWE-346: Origin Validation Error in Trend Micro, Inc. Trend Micro Apex Central
HighCVE-2025-69258: CWE-290: Authentication Bypass by Spoofing in Trend Micro, Inc. Trend Micro Apex Central
CriticalCVE-2025-62877: CWE-1188: Initialization of a Resource with an Insecure Default in SUSE harvester
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.