Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64424: CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') in coollabsio coolify

0
Critical
VulnerabilityCVE-2025-64424cvecve-2025-64424cwe-77
Published: Mon Jan 05 2026 (01/05/2026, 20:45:09 UTC)
Source: CVE Database V5
Vendor/Project: coollabsio
Product: coolify

Description

CVE-2025-64424 is a critical command injection vulnerability in Coolify versions up to 4. 0. 0-beta. 434. It allows a low-privileged user with member access to execute arbitrary system commands as root via the git source input fields. This vulnerability arises from improper neutralization of special elements in command inputs (CWE-77). Exploitation requires no user interaction and no authentication beyond low-privileged membership. The CVSS 4. 0 score is 9. 4, reflecting high impact on confidentiality, integrity, and availability.

AI-Powered Analysis

AILast updated: 01/12/2026, 21:37:52 UTC

Technical Analysis

CVE-2025-64424 is a critical command injection vulnerability identified in Coolify, an open-source, self-hostable platform used for managing servers, applications, and databases. The vulnerability exists in versions up to and including 4.0.0-beta.434 and is located specifically in the git source input fields of a resource. Due to improper neutralization of special elements in these input fields (classified under CWE-77), a low-privileged user with member-level access can inject malicious commands that are executed with root privileges on the underlying system hosting the Coolify instance. This means an attacker can fully compromise the host system, leading to complete loss of confidentiality, integrity, and availability. The vulnerability requires no user interaction and no higher privilege than member access, making it highly exploitable. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), no user interaction (UI:N), and high impact on all security properties (VC:H, VI:H, VA:H). As of the publication date, no patch or fix has been released, increasing the urgency for organizations to implement compensating controls. Coolify’s role in managing critical infrastructure components means exploitation could lead to widespread disruption, data theft, or persistent backdoors. The lack of known exploits in the wild does not diminish the severity given the ease of exploitation and potential impact.

Potential Impact

For European organizations, the impact of this vulnerability is severe. Coolify is used to manage critical infrastructure such as servers, applications, and databases, often in cloud or hybrid environments. Exploitation could allow attackers to gain root access, leading to full system compromise, data breaches, service disruption, and lateral movement within networks. This could affect confidentiality of sensitive data, integrity of applications and configurations, and availability of services. Organizations relying on Coolify for multi-tenant or production environments face risks of unauthorized access and control. The vulnerability could also be leveraged to deploy ransomware or persistent malware. Given the criticality of the flaw and the absence of a patch, European entities must assume a high risk posture, especially those in sectors like finance, healthcare, and critical infrastructure where Coolify might be deployed. The potential for supply chain attacks also exists if Coolify-managed environments are used to deploy software to customers or partners.

Mitigation Recommendations

1. Immediately restrict member-level access to trusted personnel only, minimizing the number of users who can input git source fields. 2. Isolate Coolify instances in segmented network zones with strict firewall rules to limit exposure. 3. Monitor system logs and command execution traces for unusual or unauthorized commands originating from Coolify. 4. Employ host-based intrusion detection systems (HIDS) to detect root-level command execution anomalies. 5. Consider temporarily disabling git source input functionality or replacing Coolify with alternative tools until a patch is available. 6. Use containerization or virtual machines to sandbox Coolify instances, limiting root-level impact on host systems. 7. Regularly review and audit Coolify configurations and user permissions. 8. Stay updated with vendor announcements for patches or mitigations and apply them promptly once available. 9. Implement multi-factor authentication and strong access controls around Coolify management interfaces. 10. Educate administrators and developers about the risks of command injection and secure input validation practices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-03T22:12:51.364Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695c24a73839e441759038e9

Added to database: 1/5/2026, 8:52:55 PM

Last enriched: 1/12/2026, 9:37:52 PM

Last updated: 2/4/2026, 7:14:38 PM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats