CVE-2025-66210: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in coollabsio coolify
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in the Database Import functionality allows users with application/service management permissions to execute arbitrary commands as root on managed servers. Database names used in import operations are passed directly to shell commands without sanitization, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-66210 is an OS command injection vulnerability classified under CWE-78, discovered in Coolify, an open-source, self-hostable platform used for managing servers, applications, and databases. The vulnerability affects all versions prior to 4.0.0-beta.451. It arises from improper sanitization of database names used during the Database Import process. Specifically, these database names are directly passed to shell commands without neutralizing special characters or validating input, which allows an authenticated user with application or service management permissions to inject arbitrary OS commands. Because these commands execute with root privileges on the managed servers, an attacker can achieve full remote code execution, compromising confidentiality, integrity, and availability of the affected systems. The vulnerability requires no additional authentication beyond management permissions and no user interaction, making exploitation straightforward once access is gained. The CVSS 4.0 score of 9.4 indicates a critical severity, with network attack vector, low attack complexity, no user interaction, and high impact on all security properties. Although no public exploits are currently known, the potential for damage is significant, especially in environments where Coolify manages critical infrastructure or sensitive data. The issue was addressed in version 4.0.0-beta.451 by properly sanitizing inputs to prevent command injection.
Potential Impact
For European organizations, the impact of this vulnerability can be severe. Organizations using Coolify to manage servers and databases risk full system compromise if an attacker gains management-level access. This can lead to unauthorized data access, data manipulation, service disruption, and potential lateral movement within networks. Critical sectors such as finance, healthcare, and government that rely on Coolify for deployment automation or database management could face operational outages and data breaches. The root-level execution capability means attackers can disable security controls, install persistent malware, or exfiltrate sensitive information. Given the ease of exploitation and high privileges involved, the vulnerability poses a significant threat to the confidentiality, integrity, and availability of affected systems. Additionally, the lack of known exploits in the wild does not reduce urgency, as the vulnerability is straightforward to exploit once access is obtained.
Mitigation Recommendations
European organizations should immediately upgrade all Coolify instances to version 4.0.0-beta.451 or later to remediate the vulnerability. Until upgrades are completed, restrict application and service management permissions strictly to trusted administrators and implement strong authentication controls such as multi-factor authentication. Monitor and audit management activities for suspicious commands or unusual behavior. Employ network segmentation to isolate management interfaces from general user networks and the internet. Use host-based intrusion detection systems to detect anomalous command executions. Additionally, review and sanitize all user inputs related to database names or other parameters passed to shell commands. Conduct regular vulnerability assessments and penetration testing focused on management interfaces. Finally, maintain an incident response plan to quickly contain and remediate any potential exploitation.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Poland, Italy, Spain
CVE-2025-66210: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in coollabsio coolify
Description
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in the Database Import functionality allows users with application/service management permissions to execute arbitrary commands as root on managed servers. Database names used in import operations are passed directly to shell commands without sanitization, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-66210 is an OS command injection vulnerability classified under CWE-78, discovered in Coolify, an open-source, self-hostable platform used for managing servers, applications, and databases. The vulnerability affects all versions prior to 4.0.0-beta.451. It arises from improper sanitization of database names used during the Database Import process. Specifically, these database names are directly passed to shell commands without neutralizing special characters or validating input, which allows an authenticated user with application or service management permissions to inject arbitrary OS commands. Because these commands execute with root privileges on the managed servers, an attacker can achieve full remote code execution, compromising confidentiality, integrity, and availability of the affected systems. The vulnerability requires no additional authentication beyond management permissions and no user interaction, making exploitation straightforward once access is gained. The CVSS 4.0 score of 9.4 indicates a critical severity, with network attack vector, low attack complexity, no user interaction, and high impact on all security properties. Although no public exploits are currently known, the potential for damage is significant, especially in environments where Coolify manages critical infrastructure or sensitive data. The issue was addressed in version 4.0.0-beta.451 by properly sanitizing inputs to prevent command injection.
Potential Impact
For European organizations, the impact of this vulnerability can be severe. Organizations using Coolify to manage servers and databases risk full system compromise if an attacker gains management-level access. This can lead to unauthorized data access, data manipulation, service disruption, and potential lateral movement within networks. Critical sectors such as finance, healthcare, and government that rely on Coolify for deployment automation or database management could face operational outages and data breaches. The root-level execution capability means attackers can disable security controls, install persistent malware, or exfiltrate sensitive information. Given the ease of exploitation and high privileges involved, the vulnerability poses a significant threat to the confidentiality, integrity, and availability of affected systems. Additionally, the lack of known exploits in the wild does not reduce urgency, as the vulnerability is straightforward to exploit once access is obtained.
Mitigation Recommendations
European organizations should immediately upgrade all Coolify instances to version 4.0.0-beta.451 or later to remediate the vulnerability. Until upgrades are completed, restrict application and service management permissions strictly to trusted administrators and implement strong authentication controls such as multi-factor authentication. Monitor and audit management activities for suspicious commands or unusual behavior. Employ network segmentation to isolate management interfaces from general user networks and the internet. Use host-based intrusion detection systems to detect anomalous command executions. Additionally, review and sanitize all user inputs related to database names or other parameters passed to shell commands. Conduct regular vulnerability assessments and penetration testing focused on management interfaces. Finally, maintain an incident response plan to quickly contain and remediate any potential exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-24T23:01:29.678Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694b1125d69af40f3132312c
Added to database: 12/23/2025, 10:01:09 PM
Last enriched: 1/7/2026, 2:53:19 AM
Last updated: 2/6/2026, 9:56:06 PM
Views: 66
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25732: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in zauberzeug nicegui
HighCVE-2026-25574: CWE-639: Authorization Bypass Through User-Controlled Key in payloadcms payload
MediumCVE-2026-25544: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in payloadcms payload
CriticalCVE-2026-25516: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in zauberzeug nicegui
MediumCVE-2026-2067: Buffer Overflow in UTT 进取 520W
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.