Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66209: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in coollabsio coolify

0
Critical
VulnerabilityCVE-2025-66209cvecve-2025-66209cwe-78
Published: Tue Dec 23 2025 (12/23/2025, 21:42:18 UTC)
Source: CVE Database V5
Vendor/Project: coollabsio
Product: coolify

Description

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in the Database Backup functionality allows users with application/service management permissions to execute arbitrary commands as root on managed servers. Database names used in backup operations are passed directly to shell commands without sanitization, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.

AI-Powered Analysis

AILast updated: 01/07/2026, 02:54:24 UTC

Technical Analysis

CVE-2025-66209 is an OS command injection vulnerability classified under CWE-78, discovered in the open-source server management tool Coolify by coollabsio. The vulnerability exists in versions prior to 4.0.0-beta.451 within the Database Backup functionality. Specifically, database names used during backup operations are passed directly to shell commands without proper sanitization or neutralization of special characters. This improper handling allows an authenticated user with application or service management permissions to inject arbitrary OS commands, which are executed with root privileges on the managed servers. The exploit does not require user interaction beyond authentication and leverages the application's elevated permissions to achieve full remote code execution. The vulnerability has a CVSS v3.1 base score of 10.0, indicating critical severity with network attack vector, low attack complexity, and privileges required but no user interaction. The scope is changed as the vulnerability affects managed servers beyond the application itself, impacting confidentiality, integrity, and availability of those systems. Although no known exploits in the wild have been reported yet, the critical nature and ease of exploitation make it a significant threat. The issue is resolved in version 4.0.0-beta.451 by properly sanitizing inputs and preventing command injection. Organizations using Coolify for managing servers, applications, and databases must upgrade promptly to mitigate this risk.

Potential Impact

For European organizations, the impact of CVE-2025-66209 is severe. The vulnerability allows attackers to execute arbitrary commands as root on managed servers, potentially leading to full system compromise, data theft, destruction, or ransomware deployment. Confidentiality is at risk due to unauthorized access to sensitive data stored on managed databases and servers. Integrity can be compromised by altering or deleting data and configurations, while availability may be disrupted by disabling services or deleting critical files. Organizations relying on Coolify for managing production environments, especially those in finance, healthcare, government, and critical infrastructure sectors, face heightened risks. The ability to escalate privileges and execute commands remotely without user interaction increases the attack surface and potential for lateral movement within networks. Additionally, the vulnerability could be leveraged to establish persistent backdoors or pivot to other internal systems, amplifying the threat. The lack of known exploits in the wild does not diminish the urgency, as public disclosure and the critical CVSS score suggest imminent exploitation attempts.

Mitigation Recommendations

1. Immediate upgrade to Coolify version 4.0.0-beta.451 or later, which contains the fix for this vulnerability. 2. Restrict application and service management permissions strictly to trusted administrators to reduce the risk of exploitation by unauthorized users. 3. Implement network segmentation and firewall rules to limit access to Coolify management interfaces only to authorized IP addresses and internal networks. 4. Monitor logs and audit trails for unusual command execution or backup operations that could indicate exploitation attempts. 5. Employ host-based intrusion detection systems (HIDS) to detect suspicious root-level command executions on managed servers. 6. Conduct regular security assessments and penetration testing focused on server management tools and backup functionalities. 7. Educate administrators on the risks of command injection vulnerabilities and the importance of input validation and sanitization in custom scripts or integrations. 8. Consider deploying application-layer firewalls or runtime application self-protection (RASP) solutions to detect and block injection attacks in real time. 9. Maintain up-to-date backups and incident response plans to quickly recover from potential compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-24T23:01:29.678Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694b1125d69af40f31323140

Added to database: 12/23/2025, 10:01:09 PM

Last enriched: 1/7/2026, 2:54:24 AM

Last updated: 2/7/2026, 8:45:31 AM

Views: 60

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats