CVE-2025-64423: CWE-287: Improper Authentication in coollabsio coolify
CVE-2025-64423 is a high-severity improper authentication vulnerability in Coolify versions up to 4. 0. 0-beta. 434. It allows low-privileged users to intercept and use administrator invitation links before the intended recipient, resulting in privilege escalation to administrator level without requiring user interaction. The vulnerability does not require UI interaction but does require the attacker to have low-level membership access. Exploitation can lead to full administrative control over the Coolify instance, compromising confidentiality, integrity, and availability of managed servers and applications. No patch is currently confirmed available, and no known exploits are reported in the wild. European organizations using Coolify for server and application management should urgently assess exposure and implement mitigations to prevent unauthorized privilege escalation.
AI Analysis
Technical Summary
CVE-2025-64423 is an improper authentication vulnerability classified under CWE-287 affecting Coolify, an open-source, self-hosted platform for managing servers, applications, and databases. In versions up to and including 4.0.0-beta.434, a low-privileged user with member-level access can view and utilize administrator invitation links intended for other users. By using these invitation links before the legitimate administrator accepts them, the attacker can escalate their privileges to administrator level. This flaw arises because invitation links are not adequately protected or invalidated upon use, allowing race conditions or link interception to grant unauthorized admin access. The vulnerability requires the attacker to have at least member access but does not require any user interaction beyond using the link. The CVSS 4.0 score of 7.7 reflects high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and partial authentication required. No patch or fix has been confirmed at the time of publication, and no active exploitation has been reported. This vulnerability poses a significant risk to environments relying on Coolify for critical infrastructure management, as an attacker gaining admin access can control deployments, configurations, and sensitive data.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized administrative access to critical server and application management infrastructure. Attackers exploiting this flaw can manipulate deployments, access sensitive databases, and disrupt service availability. The breach of administrative privileges undermines trust in the platform and can lead to data breaches, service outages, and potential lateral movement within the network. Organizations using Coolify in regulated sectors such as finance, healthcare, or government face increased compliance risks and potential legal consequences due to unauthorized access and data exposure. The impact is magnified in multi-tenant or cloud-hosted environments where Coolify manages multiple clients or services. Given the network-based attack vector and ease of exploitation by low-privileged users, the threat is significant for any European entity deploying vulnerable versions of Coolify.
Mitigation Recommendations
European organizations should immediately audit their Coolify deployments to identify affected versions (<=4.0.0-beta.434). Until a patch is available, restrict member-level user permissions to the minimum necessary and monitor invitation link usage closely. Implement network segmentation and access controls to limit exposure of Coolify management interfaces. Use multi-factor authentication (MFA) for all administrative accounts to add an additional layer of protection. Consider disabling or tightly controlling the invitation link feature if possible. Regularly review logs for suspicious activity related to invitation links and privilege escalations. Engage with the Coolify community or vendor for updates on patches or mitigations. Additionally, implement incident response plans to quickly revoke compromised credentials and restore secure configurations if exploitation is suspected.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2025-64423: CWE-287: Improper Authentication in coollabsio coolify
Description
CVE-2025-64423 is a high-severity improper authentication vulnerability in Coolify versions up to 4. 0. 0-beta. 434. It allows low-privileged users to intercept and use administrator invitation links before the intended recipient, resulting in privilege escalation to administrator level without requiring user interaction. The vulnerability does not require UI interaction but does require the attacker to have low-level membership access. Exploitation can lead to full administrative control over the Coolify instance, compromising confidentiality, integrity, and availability of managed servers and applications. No patch is currently confirmed available, and no known exploits are reported in the wild. European organizations using Coolify for server and application management should urgently assess exposure and implement mitigations to prevent unauthorized privilege escalation.
AI-Powered Analysis
Technical Analysis
CVE-2025-64423 is an improper authentication vulnerability classified under CWE-287 affecting Coolify, an open-source, self-hosted platform for managing servers, applications, and databases. In versions up to and including 4.0.0-beta.434, a low-privileged user with member-level access can view and utilize administrator invitation links intended for other users. By using these invitation links before the legitimate administrator accepts them, the attacker can escalate their privileges to administrator level. This flaw arises because invitation links are not adequately protected or invalidated upon use, allowing race conditions or link interception to grant unauthorized admin access. The vulnerability requires the attacker to have at least member access but does not require any user interaction beyond using the link. The CVSS 4.0 score of 7.7 reflects high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and partial authentication required. No patch or fix has been confirmed at the time of publication, and no active exploitation has been reported. This vulnerability poses a significant risk to environments relying on Coolify for critical infrastructure management, as an attacker gaining admin access can control deployments, configurations, and sensitive data.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized administrative access to critical server and application management infrastructure. Attackers exploiting this flaw can manipulate deployments, access sensitive databases, and disrupt service availability. The breach of administrative privileges undermines trust in the platform and can lead to data breaches, service outages, and potential lateral movement within the network. Organizations using Coolify in regulated sectors such as finance, healthcare, or government face increased compliance risks and potential legal consequences due to unauthorized access and data exposure. The impact is magnified in multi-tenant or cloud-hosted environments where Coolify manages multiple clients or services. Given the network-based attack vector and ease of exploitation by low-privileged users, the threat is significant for any European entity deploying vulnerable versions of Coolify.
Mitigation Recommendations
European organizations should immediately audit their Coolify deployments to identify affected versions (<=4.0.0-beta.434). Until a patch is available, restrict member-level user permissions to the minimum necessary and monitor invitation link usage closely. Implement network segmentation and access controls to limit exposure of Coolify management interfaces. Use multi-factor authentication (MFA) for all administrative accounts to add an additional layer of protection. Consider disabling or tightly controlling the invitation link feature if possible. Regularly review logs for suspicious activity related to invitation links and privilege escalations. Engage with the Coolify community or vendor for updates on patches or mitigations. Additionally, implement incident response plans to quickly revoke compromised credentials and restore secure configurations if exploitation is suspected.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-03T22:12:51.364Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695c24a73839e441759038f1
Added to database: 1/5/2026, 8:52:55 PM
Last enriched: 1/12/2026, 9:37:36 PM
Last updated: 2/7/2026, 6:13:18 AM
Views: 45
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumCVE-2025-12159: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2026-2075: Improper Access Controls in yeqifu warehouse
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.