Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64423: CWE-287: Improper Authentication in coollabsio coolify

0
High
VulnerabilityCVE-2025-64423cvecve-2025-64423cwe-287
Published: Mon Jan 05 2026 (01/05/2026, 20:41:37 UTC)
Source: CVE Database V5
Vendor/Project: coollabsio
Product: coolify

Description

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In Coolify versions up to and including v4.0.0-beta.434, a low privileged user (member) can see and use invitation links sent to an administrator. When they use the link before the legitimate recipient does, they are able to log in as an administrator, meaning they have successfully escalated their privileges. As of time of publication, it is unclear if a patch is available.

AI-Powered Analysis

AILast updated: 01/05/2026, 21:07:12 UTC

Technical Analysis

CVE-2025-64423 is an improper authentication vulnerability classified under CWE-287 affecting Coolify, an open-source, self-hostable platform used for managing servers, applications, and databases. In versions up to and including 4.0.0-beta.434, a low privileged user assigned the 'member' role can access invitation links intended for administrators. These invitation links are used to onboard new administrators by granting them elevated privileges. Due to insufficient access control and validation on the invitation mechanism, a member can intercept or use an administrator's invitation link before the legitimate recipient does. By doing so, the attacker effectively escalates their privileges to administrator level without needing the administrator's credentials or additional authentication factors. This flaw does not require user interaction beyond the attacker using the invitation link and can be exploited remotely over the network. The vulnerability impacts confidentiality by exposing administrative access, integrity by allowing unauthorized changes, and availability by potentially disrupting administrative control. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L) but no user interaction (UI:N), with high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). As of the publication date, no patch or fix has been confirmed, and no known exploits have been reported in the wild. The vulnerability arises from improper authentication and authorization checks on invitation link usage, a critical flaw in the access control design of Coolify's user management system.

Potential Impact

For European organizations using Coolify, this vulnerability poses a significant risk. Unauthorized privilege escalation to administrator level can lead to full control over managed servers, applications, and databases, potentially exposing sensitive data and critical infrastructure. Attackers could manipulate configurations, deploy malicious code, or disrupt services, impacting business continuity and compliance with data protection regulations such as GDPR. The ability to exploit this remotely without user interaction increases the threat surface, especially in environments with multiple users and frequent administrative invitations. Organizations relying on Coolify for DevOps automation or infrastructure management may face operational disruptions and reputational damage if exploited. The lack of a confirmed patch increases exposure time, necessitating immediate mitigation efforts. Given the growing adoption of open-source management tools in Europe, the impact can be widespread, particularly in sectors like finance, healthcare, and technology where secure infrastructure management is paramount.

Mitigation Recommendations

Until an official patch is released, European organizations should implement strict controls around invitation link generation and distribution. This includes limiting invitation link creation to trusted personnel, using secure communication channels to share links, and monitoring invitation link usage logs for suspicious activity. Implement network segmentation and access controls to restrict member role capabilities and isolate critical management interfaces. Consider temporarily disabling invitation-based onboarding or replacing it with manual administrator account provisioning. Employ multi-factor authentication (MFA) for all administrator accounts to reduce risk if privilege escalation occurs. Regularly audit user roles and privileges to detect anomalies. Stay informed on updates from Coollabsio and apply patches immediately once available. Additionally, conduct penetration testing focused on invitation workflows to identify and remediate related weaknesses. Deploy intrusion detection systems to alert on unusual administrative access patterns. These targeted measures go beyond generic advice by focusing on the specific attack vector and operational context of Coolify deployments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-03T22:12:51.364Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695c24a73839e441759038f1

Added to database: 1/5/2026, 8:52:55 PM

Last enriched: 1/5/2026, 9:07:12 PM

Last updated: 1/8/2026, 2:27:20 PM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats