CVE-2025-66209: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in coollabsio coolify
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in the Database Backup functionality allows users with application/service management permissions to execute arbitrary commands as root on managed servers. Database names used in backup operations are passed directly to shell commands without sanitization, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-66209 is an OS command injection vulnerability classified under CWE-78, discovered in the open-source server management tool Coolify by coollabsio. The vulnerability exists in versions prior to 4.0.0-beta.451 within the Database Backup functionality. Specifically, database names used during backup operations are passed directly to shell commands without proper sanitization or neutralization of special characters. This improper handling allows an authenticated user with application or service management permissions to inject arbitrary OS commands, which are executed with root privileges on the managed servers. The exploit does not require user interaction beyond authentication and leverages the application's elevated permissions to achieve full remote code execution. The vulnerability has a CVSS v3.1 base score of 10.0, indicating critical severity with network attack vector, low attack complexity, and privileges required but no user interaction. The scope is changed as the vulnerability affects managed servers beyond the application itself, impacting confidentiality, integrity, and availability of those systems. Although no known exploits in the wild have been reported yet, the critical nature and ease of exploitation make it a significant threat. The issue is resolved in version 4.0.0-beta.451 by properly sanitizing inputs and preventing command injection. Organizations using Coolify for managing servers, applications, and databases must upgrade promptly to mitigate this risk.
Potential Impact
For European organizations, the impact of CVE-2025-66209 is severe. The vulnerability allows attackers to execute arbitrary commands as root on managed servers, potentially leading to full system compromise, data theft, destruction, or ransomware deployment. Confidentiality is at risk due to unauthorized access to sensitive data stored on managed databases and servers. Integrity can be compromised by altering or deleting data and configurations, while availability may be disrupted by disabling services or deleting critical files. Organizations relying on Coolify for managing production environments, especially those in finance, healthcare, government, and critical infrastructure sectors, face heightened risks. The ability to escalate privileges and execute commands remotely without user interaction increases the attack surface and potential for lateral movement within networks. Additionally, the vulnerability could be leveraged to establish persistent backdoors or pivot to other internal systems, amplifying the threat. The lack of known exploits in the wild does not diminish the urgency, as public disclosure and the critical CVSS score suggest imminent exploitation attempts.
Mitigation Recommendations
1. Immediate upgrade to Coolify version 4.0.0-beta.451 or later, which contains the fix for this vulnerability. 2. Restrict application and service management permissions strictly to trusted administrators to reduce the risk of exploitation by unauthorized users. 3. Implement network segmentation and firewall rules to limit access to Coolify management interfaces only to authorized IP addresses and internal networks. 4. Monitor logs and audit trails for unusual command execution or backup operations that could indicate exploitation attempts. 5. Employ host-based intrusion detection systems (HIDS) to detect suspicious root-level command executions on managed servers. 6. Conduct regular security assessments and penetration testing focused on server management tools and backup functionalities. 7. Educate administrators on the risks of command injection vulnerabilities and the importance of input validation and sanitization in custom scripts or integrations. 8. Consider deploying application-layer firewalls or runtime application self-protection (RASP) solutions to detect and block injection attacks in real time. 9. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2025-66209: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in coollabsio coolify
Description
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in the Database Backup functionality allows users with application/service management permissions to execute arbitrary commands as root on managed servers. Database names used in backup operations are passed directly to shell commands without sanitization, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-66209 is an OS command injection vulnerability classified under CWE-78, discovered in the open-source server management tool Coolify by coollabsio. The vulnerability exists in versions prior to 4.0.0-beta.451 within the Database Backup functionality. Specifically, database names used during backup operations are passed directly to shell commands without proper sanitization or neutralization of special characters. This improper handling allows an authenticated user with application or service management permissions to inject arbitrary OS commands, which are executed with root privileges on the managed servers. The exploit does not require user interaction beyond authentication and leverages the application's elevated permissions to achieve full remote code execution. The vulnerability has a CVSS v3.1 base score of 10.0, indicating critical severity with network attack vector, low attack complexity, and privileges required but no user interaction. The scope is changed as the vulnerability affects managed servers beyond the application itself, impacting confidentiality, integrity, and availability of those systems. Although no known exploits in the wild have been reported yet, the critical nature and ease of exploitation make it a significant threat. The issue is resolved in version 4.0.0-beta.451 by properly sanitizing inputs and preventing command injection. Organizations using Coolify for managing servers, applications, and databases must upgrade promptly to mitigate this risk.
Potential Impact
For European organizations, the impact of CVE-2025-66209 is severe. The vulnerability allows attackers to execute arbitrary commands as root on managed servers, potentially leading to full system compromise, data theft, destruction, or ransomware deployment. Confidentiality is at risk due to unauthorized access to sensitive data stored on managed databases and servers. Integrity can be compromised by altering or deleting data and configurations, while availability may be disrupted by disabling services or deleting critical files. Organizations relying on Coolify for managing production environments, especially those in finance, healthcare, government, and critical infrastructure sectors, face heightened risks. The ability to escalate privileges and execute commands remotely without user interaction increases the attack surface and potential for lateral movement within networks. Additionally, the vulnerability could be leveraged to establish persistent backdoors or pivot to other internal systems, amplifying the threat. The lack of known exploits in the wild does not diminish the urgency, as public disclosure and the critical CVSS score suggest imminent exploitation attempts.
Mitigation Recommendations
1. Immediate upgrade to Coolify version 4.0.0-beta.451 or later, which contains the fix for this vulnerability. 2. Restrict application and service management permissions strictly to trusted administrators to reduce the risk of exploitation by unauthorized users. 3. Implement network segmentation and firewall rules to limit access to Coolify management interfaces only to authorized IP addresses and internal networks. 4. Monitor logs and audit trails for unusual command execution or backup operations that could indicate exploitation attempts. 5. Employ host-based intrusion detection systems (HIDS) to detect suspicious root-level command executions on managed servers. 6. Conduct regular security assessments and penetration testing focused on server management tools and backup functionalities. 7. Educate administrators on the risks of command injection vulnerabilities and the importance of input validation and sanitization in custom scripts or integrations. 8. Consider deploying application-layer firewalls or runtime application self-protection (RASP) solutions to detect and block injection attacks in real time. 9. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-24T23:01:29.678Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694b1125d69af40f31323140
Added to database: 12/23/2025, 10:01:09 PM
Last enriched: 1/7/2026, 2:54:24 AM
Last updated: 2/6/2026, 11:05:07 PM
Views: 59
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.