CVE-2025-64424: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in coollabsio coolify
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In Coolify versions up to and including v4.0.0-beta.434, a command injection vulnerability exists in the git source input fields of a resource, allowing a low privileged user (member) to execute system commands as root on the Coolify instance. As of time of publication, it is unclear if a patch is available.
AI Analysis
Technical Summary
CVE-2025-64424 is a command injection vulnerability identified in Coolify, an open-source, self-hostable platform used for managing servers, applications, and databases. The flaw exists in the git source input fields of a resource, where input is improperly sanitized, allowing special command elements to be injected and executed. This vulnerability is classified under CWE-77, indicating improper neutralization of special elements used in commands. A low-privileged user with member-level access can exploit this flaw to execute arbitrary system commands with root privileges on the Coolify instance, leading to full system compromise. The vulnerability affects all Coolify versions up to and including 4.0.0-beta.434. The CVSS 4.0 base score is 9.4, reflecting critical severity due to network attack vector (AV:N), low attack complexity (AC:L), no required authentication (AT:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). No public exploits or patches are currently available, increasing the urgency for organizations to implement interim mitigations. The root cause is insufficient input validation and sanitization in the git source input fields, allowing command injection. This vulnerability could be leveraged to gain persistent root access, deploy malware, exfiltrate sensitive data, or disrupt services. Given Coolify’s role in managing critical infrastructure components, exploitation could have cascading effects on dependent applications and services.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the potential for complete system takeover with root privileges. Organizations using Coolify to manage production servers, databases, or applications could face data breaches, service outages, and unauthorized access to sensitive information. The ability for a low-privileged user to escalate privileges to root means insider threats or compromised accounts could lead to rapid lateral movement and persistent footholds within networks. The impact extends to cloud environments and hybrid infrastructures where Coolify is deployed for orchestration and automation. Disruption of these management tools can lead to downtime, loss of business continuity, and reputational damage. Additionally, regulatory compliance risks arise if personal or sensitive data is exposed or systems are compromised, especially under GDPR requirements. The lack of a patch at the time of disclosure means organizations must rely on compensating controls to mitigate risk until an official fix is released.
Mitigation Recommendations
1. Immediately restrict access to Coolify management interfaces to trusted administrators only, using network segmentation and firewall rules. 2. Enforce strict role-based access control (RBAC) to limit membership privileges and reduce the number of users with git source input capabilities. 3. Monitor logs and system behavior for unusual command executions or privilege escalations, employing endpoint detection and response (EDR) tools. 4. Disable or restrict git source input fields if possible until a patch is available. 5. Regularly audit Coolify instances for unauthorized changes or suspicious activity. 6. Stay informed on vendor advisories and apply patches promptly once released. 7. Consider deploying Coolify instances in isolated environments or containers to limit blast radius. 8. Implement multi-factor authentication (MFA) for all users to reduce risk of account compromise. 9. Conduct internal penetration testing focusing on command injection vectors in Coolify. 10. Educate users about the risks of command injection and the importance of secure input handling.
Affected Countries
Germany, France, Netherlands, United Kingdom, Sweden, Finland
CVE-2025-64424: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in coollabsio coolify
Description
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In Coolify versions up to and including v4.0.0-beta.434, a command injection vulnerability exists in the git source input fields of a resource, allowing a low privileged user (member) to execute system commands as root on the Coolify instance. As of time of publication, it is unclear if a patch is available.
AI-Powered Analysis
Technical Analysis
CVE-2025-64424 is a command injection vulnerability identified in Coolify, an open-source, self-hostable platform used for managing servers, applications, and databases. The flaw exists in the git source input fields of a resource, where input is improperly sanitized, allowing special command elements to be injected and executed. This vulnerability is classified under CWE-77, indicating improper neutralization of special elements used in commands. A low-privileged user with member-level access can exploit this flaw to execute arbitrary system commands with root privileges on the Coolify instance, leading to full system compromise. The vulnerability affects all Coolify versions up to and including 4.0.0-beta.434. The CVSS 4.0 base score is 9.4, reflecting critical severity due to network attack vector (AV:N), low attack complexity (AC:L), no required authentication (AT:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). No public exploits or patches are currently available, increasing the urgency for organizations to implement interim mitigations. The root cause is insufficient input validation and sanitization in the git source input fields, allowing command injection. This vulnerability could be leveraged to gain persistent root access, deploy malware, exfiltrate sensitive data, or disrupt services. Given Coolify’s role in managing critical infrastructure components, exploitation could have cascading effects on dependent applications and services.
Potential Impact
For European organizations, this vulnerability poses a significant risk due to the potential for complete system takeover with root privileges. Organizations using Coolify to manage production servers, databases, or applications could face data breaches, service outages, and unauthorized access to sensitive information. The ability for a low-privileged user to escalate privileges to root means insider threats or compromised accounts could lead to rapid lateral movement and persistent footholds within networks. The impact extends to cloud environments and hybrid infrastructures where Coolify is deployed for orchestration and automation. Disruption of these management tools can lead to downtime, loss of business continuity, and reputational damage. Additionally, regulatory compliance risks arise if personal or sensitive data is exposed or systems are compromised, especially under GDPR requirements. The lack of a patch at the time of disclosure means organizations must rely on compensating controls to mitigate risk until an official fix is released.
Mitigation Recommendations
1. Immediately restrict access to Coolify management interfaces to trusted administrators only, using network segmentation and firewall rules. 2. Enforce strict role-based access control (RBAC) to limit membership privileges and reduce the number of users with git source input capabilities. 3. Monitor logs and system behavior for unusual command executions or privilege escalations, employing endpoint detection and response (EDR) tools. 4. Disable or restrict git source input fields if possible until a patch is available. 5. Regularly audit Coolify instances for unauthorized changes or suspicious activity. 6. Stay informed on vendor advisories and apply patches promptly once released. 7. Consider deploying Coolify instances in isolated environments or containers to limit blast radius. 8. Implement multi-factor authentication (MFA) for all users to reduce risk of account compromise. 9. Conduct internal penetration testing focusing on command injection vectors in Coolify. 10. Educate users about the risks of command injection and the importance of secure input handling.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-03T22:12:51.364Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695c24a73839e441759038e9
Added to database: 1/5/2026, 8:52:55 PM
Last enriched: 1/5/2026, 9:07:43 PM
Last updated: 1/8/2026, 2:14:52 PM
Views: 53
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-8307: CWE-257 Storing Passwords in a Recoverable Format in Asseco InfoMedica Plus
MediumCVE-2025-8306: CWE-1220 Insufficient Granularity of Access Control in Asseco InfoMedica Plus
MediumCVE-2025-14025: Incorrect Execution-Assigned Permissions in Red Hat Red Hat Ansible Automation Platform 2
HighCVE-2026-21891: CWE-287: Improper Authentication in IceWhaleTech ZimaOS
CriticalCVE-2026-21885: CWE-918: Server-Side Request Forgery (SSRF) in miniflux v2
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.