CVE-2025-66211: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in coollabsio coolify
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in PostgreSQL Init Script Filename handling allows users with application/service management permissions to execute arbitrary commands as root on managed servers. PostgreSQL initialization script filenames are passed to shell commands without proper validation, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-66211 is an OS command injection vulnerability classified under CWE-78 affecting coollabsio's Coolify, an open-source, self-hostable platform for managing servers, applications, and databases. The vulnerability exists in versions prior to 4.0.0-beta.451 and stems from improper neutralization of special elements in PostgreSQL initialization script filenames. Specifically, when users with application or service management permissions provide PostgreSQL init script filenames, these inputs are passed directly to shell commands without adequate validation or sanitization. This allows an attacker with authenticated access and limited privileges within the application to inject arbitrary shell commands, which are executed with root privileges on the managed servers. The vulnerability does not require user interaction and can be exploited remotely over the network, making it highly dangerous. The CVSS 4.0 score of 9.4 reflects its critical severity, with high impact on confidentiality, integrity, and availability, and low attack complexity. The flaw enables full remote code execution, potentially compromising entire server environments managed by Coolify. The issue was publicly disclosed on December 23, 2025, and fixed in version 4.0.0-beta.451. No known exploits have been reported in the wild yet, but the vulnerability's nature and ease of exploitation make it a prime target for attackers once weaponized. Organizations using Coolify should prioritize upgrading to the patched version and review access controls to limit exposure.
Potential Impact
For European organizations, the impact of CVE-2025-66211 can be severe. Coolify is used to manage critical infrastructure including servers, applications, and databases; exploitation could lead to full system compromise, data breaches, service disruption, and lateral movement within networks. The ability to execute arbitrary commands as root means attackers can install malware, exfiltrate sensitive data, disrupt services, or pivot to other systems. This could affect sectors reliant on Coolify for DevOps and infrastructure management, including finance, healthcare, government, and technology companies. Given the criticality of root-level access, the vulnerability threatens confidentiality, integrity, and availability of systems. The lack of required user interaction and low complexity of exploitation increase the risk of rapid compromise. Additionally, organizations subject to strict data protection regulations such as GDPR face compliance and reputational risks if exploited. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the threat landscape may evolve quickly.
Mitigation Recommendations
1. Immediately upgrade all Coolify instances to version 4.0.0-beta.451 or later, where the vulnerability is patched. 2. Restrict application/service management permissions to trusted administrators only, minimizing the number of users who can provide PostgreSQL init script filenames. 3. Implement strict input validation and sanitization on any user-supplied filenames or parameters related to PostgreSQL initialization scripts, even beyond the patched version, as a defense-in-depth measure. 4. Monitor logs for unusual command execution patterns or unexpected root-level activities on managed servers. 5. Employ network segmentation to isolate critical infrastructure managed by Coolify, limiting potential lateral movement if compromised. 6. Use multi-factor authentication (MFA) for all administrative access to Coolify to reduce risk of credential compromise. 7. Regularly audit and review user permissions within Coolify to ensure least privilege principles are enforced. 8. Consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) tools to detect and block suspicious command injection attempts. 9. Maintain up-to-date backups of critical systems managed by Coolify to enable recovery in case of compromise. 10. Stay informed about any emerging exploits or advisories related to this CVE to respond promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium, Italy, Spain
CVE-2025-66211: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in coollabsio coolify
Description
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in PostgreSQL Init Script Filename handling allows users with application/service management permissions to execute arbitrary commands as root on managed servers. PostgreSQL initialization script filenames are passed to shell commands without proper validation, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-66211 is an OS command injection vulnerability classified under CWE-78 affecting coollabsio's Coolify, an open-source, self-hostable platform for managing servers, applications, and databases. The vulnerability exists in versions prior to 4.0.0-beta.451 and stems from improper neutralization of special elements in PostgreSQL initialization script filenames. Specifically, when users with application or service management permissions provide PostgreSQL init script filenames, these inputs are passed directly to shell commands without adequate validation or sanitization. This allows an attacker with authenticated access and limited privileges within the application to inject arbitrary shell commands, which are executed with root privileges on the managed servers. The vulnerability does not require user interaction and can be exploited remotely over the network, making it highly dangerous. The CVSS 4.0 score of 9.4 reflects its critical severity, with high impact on confidentiality, integrity, and availability, and low attack complexity. The flaw enables full remote code execution, potentially compromising entire server environments managed by Coolify. The issue was publicly disclosed on December 23, 2025, and fixed in version 4.0.0-beta.451. No known exploits have been reported in the wild yet, but the vulnerability's nature and ease of exploitation make it a prime target for attackers once weaponized. Organizations using Coolify should prioritize upgrading to the patched version and review access controls to limit exposure.
Potential Impact
For European organizations, the impact of CVE-2025-66211 can be severe. Coolify is used to manage critical infrastructure including servers, applications, and databases; exploitation could lead to full system compromise, data breaches, service disruption, and lateral movement within networks. The ability to execute arbitrary commands as root means attackers can install malware, exfiltrate sensitive data, disrupt services, or pivot to other systems. This could affect sectors reliant on Coolify for DevOps and infrastructure management, including finance, healthcare, government, and technology companies. Given the criticality of root-level access, the vulnerability threatens confidentiality, integrity, and availability of systems. The lack of required user interaction and low complexity of exploitation increase the risk of rapid compromise. Additionally, organizations subject to strict data protection regulations such as GDPR face compliance and reputational risks if exploited. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the threat landscape may evolve quickly.
Mitigation Recommendations
1. Immediately upgrade all Coolify instances to version 4.0.0-beta.451 or later, where the vulnerability is patched. 2. Restrict application/service management permissions to trusted administrators only, minimizing the number of users who can provide PostgreSQL init script filenames. 3. Implement strict input validation and sanitization on any user-supplied filenames or parameters related to PostgreSQL initialization scripts, even beyond the patched version, as a defense-in-depth measure. 4. Monitor logs for unusual command execution patterns or unexpected root-level activities on managed servers. 5. Employ network segmentation to isolate critical infrastructure managed by Coolify, limiting potential lateral movement if compromised. 6. Use multi-factor authentication (MFA) for all administrative access to Coolify to reduce risk of credential compromise. 7. Regularly audit and review user permissions within Coolify to ensure least privilege principles are enforced. 8. Consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) tools to detect and block suspicious command injection attempts. 9. Maintain up-to-date backups of critical systems managed by Coolify to enable recovery in case of compromise. 10. Stay informed about any emerging exploits or advisories related to this CVE to respond promptly.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-24T23:01:29.678Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694b149ad69af40f3136cc78
Added to database: 12/23/2025, 10:15:54 PM
Last enriched: 1/7/2026, 2:53:33 AM
Last updated: 2/4/2026, 4:03:19 PM
Views: 302
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-22549: CWE-250: Execution with Unnecessary Privileges in F5 F5 BIG-IP Container Ingress Services
MediumCVE-2025-70545: n/a
HighCVE-2026-0873: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Ercom Cryptobox
MediumCVE-2026-22548: CWE-362 Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') in F5 BIG-IP
MediumCVE-2026-20732: CWE-451: User Interface (UI) Misrepresentation of Critical Information in F5 BIG-IP
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.