Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66211: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in coollabsio coolify

0
Critical
VulnerabilityCVE-2025-66211cvecve-2025-66211cwe-78
Published: Tue Dec 23 2025 (12/23/2025, 22:00:36 UTC)
Source: CVE Database V5
Vendor/Project: coollabsio
Product: coolify

Description

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in PostgreSQL Init Script Filename handling allows users with application/service management permissions to execute arbitrary commands as root on managed servers. PostgreSQL initialization script filenames are passed to shell commands without proper validation, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.

AI-Powered Analysis

AILast updated: 01/07/2026, 02:53:33 UTC

Technical Analysis

CVE-2025-66211 is an OS command injection vulnerability classified under CWE-78 affecting coollabsio's Coolify, an open-source, self-hostable platform for managing servers, applications, and databases. The vulnerability exists in versions prior to 4.0.0-beta.451 and stems from improper neutralization of special elements in PostgreSQL initialization script filenames. Specifically, when users with application or service management permissions provide PostgreSQL init script filenames, these inputs are passed directly to shell commands without adequate validation or sanitization. This allows an attacker with authenticated access and limited privileges within the application to inject arbitrary shell commands, which are executed with root privileges on the managed servers. The vulnerability does not require user interaction and can be exploited remotely over the network, making it highly dangerous. The CVSS 4.0 score of 9.4 reflects its critical severity, with high impact on confidentiality, integrity, and availability, and low attack complexity. The flaw enables full remote code execution, potentially compromising entire server environments managed by Coolify. The issue was publicly disclosed on December 23, 2025, and fixed in version 4.0.0-beta.451. No known exploits have been reported in the wild yet, but the vulnerability's nature and ease of exploitation make it a prime target for attackers once weaponized. Organizations using Coolify should prioritize upgrading to the patched version and review access controls to limit exposure.

Potential Impact

For European organizations, the impact of CVE-2025-66211 can be severe. Coolify is used to manage critical infrastructure including servers, applications, and databases; exploitation could lead to full system compromise, data breaches, service disruption, and lateral movement within networks. The ability to execute arbitrary commands as root means attackers can install malware, exfiltrate sensitive data, disrupt services, or pivot to other systems. This could affect sectors reliant on Coolify for DevOps and infrastructure management, including finance, healthcare, government, and technology companies. Given the criticality of root-level access, the vulnerability threatens confidentiality, integrity, and availability of systems. The lack of required user interaction and low complexity of exploitation increase the risk of rapid compromise. Additionally, organizations subject to strict data protection regulations such as GDPR face compliance and reputational risks if exploited. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the threat landscape may evolve quickly.

Mitigation Recommendations

1. Immediately upgrade all Coolify instances to version 4.0.0-beta.451 or later, where the vulnerability is patched. 2. Restrict application/service management permissions to trusted administrators only, minimizing the number of users who can provide PostgreSQL init script filenames. 3. Implement strict input validation and sanitization on any user-supplied filenames or parameters related to PostgreSQL initialization scripts, even beyond the patched version, as a defense-in-depth measure. 4. Monitor logs for unusual command execution patterns or unexpected root-level activities on managed servers. 5. Employ network segmentation to isolate critical infrastructure managed by Coolify, limiting potential lateral movement if compromised. 6. Use multi-factor authentication (MFA) for all administrative access to Coolify to reduce risk of credential compromise. 7. Regularly audit and review user permissions within Coolify to ensure least privilege principles are enforced. 8. Consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) tools to detect and block suspicious command injection attempts. 9. Maintain up-to-date backups of critical systems managed by Coolify to enable recovery in case of compromise. 10. Stay informed about any emerging exploits or advisories related to this CVE to respond promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-24T23:01:29.678Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694b149ad69af40f3136cc78

Added to database: 12/23/2025, 10:15:54 PM

Last enriched: 1/7/2026, 2:53:33 AM

Last updated: 2/4/2026, 4:03:19 PM

Views: 302

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats