Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66211: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in coollabsio coolify

0
Critical
VulnerabilityCVE-2025-66211cvecve-2025-66211cwe-78
Published: Tue Dec 23 2025 (12/23/2025, 22:00:36 UTC)
Source: CVE Database V5
Vendor/Project: coollabsio
Product: coolify

Description

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in PostgreSQL Init Script Filename handling allows users with application/service management permissions to execute arbitrary commands as root on managed servers. PostgreSQL initialization script filenames are passed to shell commands without proper validation, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.

AI-Powered Analysis

AILast updated: 12/23/2025, 22:27:48 UTC

Technical Analysis

CVE-2025-66211 is an OS command injection vulnerability classified under CWE-78 that affects Coolify, an open-source, self-hostable platform used for managing servers, applications, and databases. The vulnerability arises from improper neutralization of special characters in PostgreSQL initialization script filenames. Specifically, Coolify versions prior to 4.0.0-beta.451 pass these filenames directly into shell commands without adequate validation or sanitization, allowing an authenticated user with application or service management permissions to inject arbitrary shell commands. Because these commands execute with root privileges on the managed servers, an attacker can achieve full remote code execution, compromising confidentiality, integrity, and availability of the affected systems. The vulnerability does not require user interaction beyond authentication, and the attack vector is network-based with low complexity. The CVSS 4.0 score of 9.4 reflects the critical nature of this flaw, with high impact on all security properties and high exploitability. Although no known exploits are currently reported in the wild, the severity and ease of exploitation make this a significant threat. The vulnerability was publicly disclosed on December 23, 2025, with a fix implemented in version 4.0.0-beta.451. Organizations using Coolify to manage PostgreSQL servers should prioritize patching to prevent potential compromise.

Potential Impact

For European organizations, this vulnerability poses a severe risk due to the potential for full system compromise on managed servers. Attackers exploiting this flaw can gain root-level access, enabling them to steal sensitive data, disrupt services, deploy ransomware, or pivot to other internal systems. Given the widespread use of PostgreSQL in enterprise environments and the growing adoption of open-source management tools like Coolify, the attack surface is significant. Critical infrastructure providers, financial institutions, and cloud service operators using Coolify could face operational disruptions and data breaches. The vulnerability's ability to bypass typical user-level restrictions and escalate privileges to root exacerbates the threat. Additionally, the lack of required user interaction beyond authentication means insider threats or compromised credentials could be leveraged easily. The impact extends beyond individual organizations, potentially affecting supply chains and service availability across sectors.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately upgrade Coolify installations to version 4.0.0-beta.451 or later, where the issue is fixed. Until patching is possible, restrict application and service management permissions to the minimum necessary users and implement strict access controls and monitoring on these accounts. Employ network segmentation to isolate management interfaces from general user networks and use multi-factor authentication to reduce the risk of credential compromise. Additionally, audit PostgreSQL initialization scripts and filenames to ensure no malicious content is present. Implement runtime monitoring and intrusion detection systems to detect anomalous command executions on managed servers. Regularly review logs for suspicious activity related to Coolify management operations. Finally, maintain an incident response plan tailored to potential root-level compromises to enable rapid containment and recovery.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-24T23:01:29.678Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694b149ad69af40f3136cc78

Added to database: 12/23/2025, 10:15:54 PM

Last enriched: 12/23/2025, 10:27:48 PM

Last updated: 12/24/2025, 1:30:28 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats