Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66212: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in coollabsio coolify

0
Critical
VulnerabilityCVE-2025-66212cvecve-2025-66212cwe-78
Published: Tue Dec 23 2025 (12/23/2025, 22:04:18 UTC)
Source: CVE Database V5
Vendor/Project: coollabsio
Product: coolify

Description

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in the Dynamic Proxy Configuration Filename handling allows users with application/service management permissions to execute arbitrary commands as root on managed servers. Proxy configuration filenames are passed to shell commands without proper escaping, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.

AI-Powered Analysis

AILast updated: 01/07/2026, 02:53:46 UTC

Technical Analysis

CVE-2025-66212 is an OS command injection vulnerability classified under CWE-78 affecting Coolify, an open-source, self-hostable platform used for managing servers, applications, and databases. The vulnerability exists in versions prior to 4.0.0-beta.451 and stems from improper neutralization of special characters in proxy configuration filenames. Specifically, when Coolify processes dynamic proxy configuration filenames, these filenames are passed directly into shell commands without adequate escaping or sanitization. This flaw allows authenticated users who have application or service management permissions to inject arbitrary shell commands. Because these commands execute with root privileges on the managed servers, an attacker can achieve full remote code execution, potentially compromising the entire system. The vulnerability does not require user interaction beyond authentication and has a low attack complexity, making exploitation feasible for insiders or attackers who have obtained management credentials. The CVSS 4.0 score of 9.4 reflects the critical nature of this vulnerability, highlighting its impact on confidentiality, integrity, and availability, as well as the wide scope of affected systems. The issue was publicly disclosed on December 23, 2025, and fixed in version 4.0.0-beta.451. No public exploits have been reported yet, but the risk remains high due to the ease of exploitation and the level of access required.

Potential Impact

For European organizations, the impact of CVE-2025-66212 can be severe. Organizations using Coolify to manage critical infrastructure, applications, or databases risk full system compromise if attackers exploit this vulnerability. Attackers could gain root-level access, leading to data breaches, service disruptions, or deployment of persistent malware. Confidentiality of sensitive data could be lost, integrity of applications and configurations compromised, and availability of services disrupted. This is particularly concerning for sectors such as finance, healthcare, government, and critical infrastructure operators in Europe, where data protection regulations like GDPR impose strict requirements on data security. Additionally, the ability to execute arbitrary commands as root could facilitate lateral movement within networks, increasing the potential scale of attacks. The lack of known exploits in the wild provides a window for mitigation, but the high severity demands immediate attention to prevent potential targeted attacks.

Mitigation Recommendations

European organizations should immediately upgrade all Coolify instances to version 4.0.0-beta.451 or later to remediate this vulnerability. Until upgrades can be applied, restrict application/service management permissions to trusted administrators only, minimizing the number of users who can exploit this flaw. Implement strict access controls and monitor logs for unusual proxy configuration filename changes or suspicious shell command executions. Employ network segmentation to isolate Coolify-managed servers from critical network segments. Use host-based intrusion detection systems (HIDS) to detect anomalous root-level command executions. Regularly audit and rotate credentials for users with elevated permissions. Additionally, consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect and block exploitation attempts. Finally, maintain an incident response plan tailored to potential Coolify compromises to enable rapid containment and recovery.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-24T23:01:29.678Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694b149ad69af40f3136cc7d

Added to database: 12/23/2025, 10:15:54 PM

Last enriched: 1/7/2026, 2:53:46 AM

Last updated: 2/7/2026, 2:14:46 PM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats