CVE-2025-66211: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in coollabsio coolify
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in PostgreSQL Init Script Filename handling allows users with application/service management permissions to execute arbitrary commands as root on managed servers. PostgreSQL initialization script filenames are passed to shell commands without proper validation, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-66211 is an OS command injection vulnerability classified under CWE-78 that affects Coolify, an open-source, self-hostable platform used for managing servers, applications, and databases. The vulnerability arises from improper neutralization of special characters in PostgreSQL initialization script filenames. Specifically, Coolify versions prior to 4.0.0-beta.451 pass these filenames directly into shell commands without adequate validation or sanitization, allowing an authenticated user with application or service management permissions to inject arbitrary shell commands. Because these commands execute with root privileges on the managed servers, an attacker can achieve full remote code execution, compromising confidentiality, integrity, and availability of the affected systems. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based with low complexity. The CVSS 4.0 score of 9.4 reflects the critical nature of this flaw, with high impact on all security properties and high exploitability. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make this a significant threat. The vulnerability was publicly disclosed on December 23, 2025, with a fix implemented in version 4.0.0-beta.451. Organizations using Coolify to manage PostgreSQL servers should prioritize patching to prevent potential compromise.
Potential Impact
For European organizations, this vulnerability poses a severe risk due to the potential for full system compromise on managed servers. Attackers exploiting this flaw can gain root-level access, enabling them to steal sensitive data, disrupt services, deploy ransomware, or pivot to other internal systems. Given the widespread use of PostgreSQL in enterprise environments and the growing adoption of open-source management tools like Coolify, the attack surface is significant. Critical infrastructure providers, financial institutions, and cloud service operators using Coolify could face operational disruptions and data breaches. The vulnerability's ability to bypass typical user-level restrictions and escalate privileges to root exacerbates the threat. Additionally, the lack of required user interaction beyond authentication means insider threats or compromised credentials could be leveraged easily. The impact extends beyond individual organizations, potentially affecting supply chains and service availability across sectors.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Coolify installations to version 4.0.0-beta.451 or later, where the issue is fixed. Until patching is possible, restrict application and service management permissions to the minimum necessary users and implement strict access controls and monitoring on these accounts. Employ network segmentation to isolate management interfaces from general user networks and use multi-factor authentication to reduce the risk of credential compromise. Additionally, audit PostgreSQL initialization scripts and filenames to ensure no malicious content is present. Implement runtime monitoring and intrusion detection systems to detect anomalous command executions on managed servers. Regularly review logs for suspicious activity related to Coolify management operations. Finally, maintain an incident response plan tailored to potential root-level compromises to enable rapid containment and recovery.
Affected Countries
Germany, France, Netherlands, United Kingdom, Sweden, Italy
CVE-2025-66211: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in coollabsio coolify
Description
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in PostgreSQL Init Script Filename handling allows users with application/service management permissions to execute arbitrary commands as root on managed servers. PostgreSQL initialization script filenames are passed to shell commands without proper validation, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-66211 is an OS command injection vulnerability classified under CWE-78 that affects Coolify, an open-source, self-hostable platform used for managing servers, applications, and databases. The vulnerability arises from improper neutralization of special characters in PostgreSQL initialization script filenames. Specifically, Coolify versions prior to 4.0.0-beta.451 pass these filenames directly into shell commands without adequate validation or sanitization, allowing an authenticated user with application or service management permissions to inject arbitrary shell commands. Because these commands execute with root privileges on the managed servers, an attacker can achieve full remote code execution, compromising confidentiality, integrity, and availability of the affected systems. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based with low complexity. The CVSS 4.0 score of 9.4 reflects the critical nature of this flaw, with high impact on all security properties and high exploitability. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make this a significant threat. The vulnerability was publicly disclosed on December 23, 2025, with a fix implemented in version 4.0.0-beta.451. Organizations using Coolify to manage PostgreSQL servers should prioritize patching to prevent potential compromise.
Potential Impact
For European organizations, this vulnerability poses a severe risk due to the potential for full system compromise on managed servers. Attackers exploiting this flaw can gain root-level access, enabling them to steal sensitive data, disrupt services, deploy ransomware, or pivot to other internal systems. Given the widespread use of PostgreSQL in enterprise environments and the growing adoption of open-source management tools like Coolify, the attack surface is significant. Critical infrastructure providers, financial institutions, and cloud service operators using Coolify could face operational disruptions and data breaches. The vulnerability's ability to bypass typical user-level restrictions and escalate privileges to root exacerbates the threat. Additionally, the lack of required user interaction beyond authentication means insider threats or compromised credentials could be leveraged easily. The impact extends beyond individual organizations, potentially affecting supply chains and service availability across sectors.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately upgrade Coolify installations to version 4.0.0-beta.451 or later, where the issue is fixed. Until patching is possible, restrict application and service management permissions to the minimum necessary users and implement strict access controls and monitoring on these accounts. Employ network segmentation to isolate management interfaces from general user networks and use multi-factor authentication to reduce the risk of credential compromise. Additionally, audit PostgreSQL initialization scripts and filenames to ensure no malicious content is present. Implement runtime monitoring and intrusion detection systems to detect anomalous command executions on managed servers. Regularly review logs for suspicious activity related to Coolify management operations. Finally, maintain an incident response plan tailored to potential root-level compromises to enable rapid containment and recovery.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-24T23:01:29.678Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694b149ad69af40f3136cc78
Added to database: 12/23/2025, 10:15:54 PM
Last enriched: 12/23/2025, 10:27:48 PM
Last updated: 12/24/2025, 1:30:28 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15050: Unrestricted Upload in code-projects Student File Management System
MediumCVE-2025-15048: Command Injection in Tenda WH450
MediumCVE-2025-68696: CWE-918: Server-Side Request Forgery (SSRF) in jnunemaker httparty
HighCVE-2025-68665: CWE-502: Deserialization of Untrusted Data in langchain-ai langchainjs
HighCVE-2025-15049: SQL Injection in code-projects Online Farm System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.