Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64424: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in coollabsio coolify

0
Critical
VulnerabilityCVE-2025-64424cvecve-2025-64424cwe-77
Published: Mon Jan 05 2026 (01/05/2026, 20:45:09 UTC)
Source: CVE Database V5
Vendor/Project: coollabsio
Product: coolify

Description

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In Coolify versions up to and including v4.0.0-beta.434, a command injection vulnerability exists in the git source input fields of a resource, allowing a low privileged user (member) to execute system commands as root on the Coolify instance. As of time of publication, it is unclear if a patch is available.

AI-Powered Analysis

AILast updated: 01/05/2026, 21:07:43 UTC

Technical Analysis

CVE-2025-64424 is a command injection vulnerability identified in Coolify, an open-source, self-hostable platform used for managing servers, applications, and databases. The flaw exists in the git source input fields of a resource, where input is improperly sanitized, allowing special command elements to be injected and executed. This vulnerability is classified under CWE-77, indicating improper neutralization of special elements used in commands. A low-privileged user with member-level access can exploit this flaw to execute arbitrary system commands with root privileges on the Coolify instance, leading to full system compromise. The vulnerability affects all Coolify versions up to and including 4.0.0-beta.434. The CVSS 4.0 base score is 9.4, reflecting critical severity due to network attack vector (AV:N), low attack complexity (AC:L), no required authentication (AT:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (VC:H/VI:H/VA:H). No public exploits or patches are currently available, increasing the urgency for organizations to implement interim mitigations. The root cause is insufficient input validation and sanitization in the git source input fields, allowing command injection. This vulnerability could be leveraged to gain persistent root access, deploy malware, exfiltrate sensitive data, or disrupt services. Given Coolify’s role in managing critical infrastructure components, exploitation could have cascading effects on dependent applications and services.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the potential for complete system takeover with root privileges. Organizations using Coolify to manage production servers, databases, or applications could face data breaches, service outages, and unauthorized access to sensitive information. The ability for a low-privileged user to escalate privileges to root means insider threats or compromised accounts could lead to rapid lateral movement and persistent footholds within networks. The impact extends to cloud environments and hybrid infrastructures where Coolify is deployed for orchestration and automation. Disruption of these management tools can lead to downtime, loss of business continuity, and reputational damage. Additionally, regulatory compliance risks arise if personal or sensitive data is exposed or systems are compromised, especially under GDPR requirements. The lack of a patch at the time of disclosure means organizations must rely on compensating controls to mitigate risk until an official fix is released.

Mitigation Recommendations

1. Immediately restrict access to Coolify management interfaces to trusted administrators only, using network segmentation and firewall rules. 2. Enforce strict role-based access control (RBAC) to limit membership privileges and reduce the number of users with git source input capabilities. 3. Monitor logs and system behavior for unusual command executions or privilege escalations, employing endpoint detection and response (EDR) tools. 4. Disable or restrict git source input fields if possible until a patch is available. 5. Regularly audit Coolify instances for unauthorized changes or suspicious activity. 6. Stay informed on vendor advisories and apply patches promptly once released. 7. Consider deploying Coolify instances in isolated environments or containers to limit blast radius. 8. Implement multi-factor authentication (MFA) for all users to reduce risk of account compromise. 9. Conduct internal penetration testing focusing on command injection vectors in Coolify. 10. Educate users about the risks of command injection and the importance of secure input handling.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-03T22:12:51.364Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695c24a73839e441759038e9

Added to database: 1/5/2026, 8:52:55 PM

Last enriched: 1/5/2026, 9:07:43 PM

Last updated: 1/8/2026, 2:14:52 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats