Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64423: CWE-287: Improper Authentication in coollabsio coolify

0
High
VulnerabilityCVE-2025-64423cvecve-2025-64423cwe-287
Published: Mon Jan 05 2026 (01/05/2026, 20:41:37 UTC)
Source: CVE Database V5
Vendor/Project: coollabsio
Product: coolify

Description

CVE-2025-64423 is a high-severity improper authentication vulnerability in Coolify versions up to 4. 0. 0-beta. 434. It allows low-privileged users to intercept and use administrator invitation links before the intended recipient, resulting in privilege escalation to administrator level without requiring user interaction. The vulnerability does not require UI interaction but does require the attacker to have low-level membership access. Exploitation can lead to full administrative control over the Coolify instance, compromising confidentiality, integrity, and availability of managed servers and applications. No patch is currently confirmed available, and no known exploits are reported in the wild. European organizations using Coolify for server and application management should urgently assess exposure and implement mitigations to prevent unauthorized privilege escalation.

AI-Powered Analysis

AILast updated: 01/12/2026, 21:37:36 UTC

Technical Analysis

CVE-2025-64423 is an improper authentication vulnerability classified under CWE-287 affecting Coolify, an open-source, self-hosted platform for managing servers, applications, and databases. In versions up to and including 4.0.0-beta.434, a low-privileged user with member-level access can view and utilize administrator invitation links intended for other users. By using these invitation links before the legitimate administrator accepts them, the attacker can escalate their privileges to administrator level. This flaw arises because invitation links are not adequately protected or invalidated upon use, allowing race conditions or link interception to grant unauthorized admin access. The vulnerability requires the attacker to have at least member access but does not require any user interaction beyond using the link. The CVSS 4.0 score of 7.7 reflects high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and partial authentication required. No patch or fix has been confirmed at the time of publication, and no active exploitation has been reported. This vulnerability poses a significant risk to environments relying on Coolify for critical infrastructure management, as an attacker gaining admin access can control deployments, configurations, and sensitive data.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized administrative access to critical server and application management infrastructure. Attackers exploiting this flaw can manipulate deployments, access sensitive databases, and disrupt service availability. The breach of administrative privileges undermines trust in the platform and can lead to data breaches, service outages, and potential lateral movement within the network. Organizations using Coolify in regulated sectors such as finance, healthcare, or government face increased compliance risks and potential legal consequences due to unauthorized access and data exposure. The impact is magnified in multi-tenant or cloud-hosted environments where Coolify manages multiple clients or services. Given the network-based attack vector and ease of exploitation by low-privileged users, the threat is significant for any European entity deploying vulnerable versions of Coolify.

Mitigation Recommendations

European organizations should immediately audit their Coolify deployments to identify affected versions (<=4.0.0-beta.434). Until a patch is available, restrict member-level user permissions to the minimum necessary and monitor invitation link usage closely. Implement network segmentation and access controls to limit exposure of Coolify management interfaces. Use multi-factor authentication (MFA) for all administrative accounts to add an additional layer of protection. Consider disabling or tightly controlling the invitation link feature if possible. Regularly review logs for suspicious activity related to invitation links and privilege escalations. Engage with the Coolify community or vendor for updates on patches or mitigations. Additionally, implement incident response plans to quickly revoke compromised credentials and restore secure configurations if exploitation is suspected.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-03T22:12:51.364Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695c24a73839e441759038f1

Added to database: 1/5/2026, 8:52:55 PM

Last enriched: 1/12/2026, 9:37:36 PM

Last updated: 2/3/2026, 4:52:54 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats