CVE-2025-66212: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in coollabsio coolify
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in the Dynamic Proxy Configuration Filename handling allows users with application/service management permissions to execute arbitrary commands as root on managed servers. Proxy configuration filenames are passed to shell commands without proper escaping, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-66212 is an OS command injection vulnerability classified under CWE-78 affecting Coolify, an open-source, self-hostable platform used for managing servers, applications, and databases. The vulnerability exists in versions prior to 4.0.0-beta.451 and stems from improper neutralization of special characters in proxy configuration filenames. Specifically, when Coolify processes dynamic proxy configuration filenames, these filenames are passed directly into shell commands without adequate escaping or sanitization. This flaw allows authenticated users who have application or service management permissions to inject arbitrary shell commands. Because these commands execute with root privileges on the managed servers, an attacker can achieve full remote code execution, potentially compromising the entire system. The vulnerability does not require user interaction beyond authentication and has a low attack complexity, making exploitation feasible for insiders or attackers who have obtained management credentials. The CVSS 4.0 score of 9.4 reflects the critical nature of this vulnerability, highlighting its impact on confidentiality, integrity, and availability, as well as the wide scope of affected systems. The issue was publicly disclosed on December 23, 2025, and fixed in version 4.0.0-beta.451. No public exploits have been reported yet, but the risk remains high due to the ease of exploitation and the level of access required.
Potential Impact
For European organizations, the impact of CVE-2025-66212 can be severe. Organizations using Coolify to manage critical infrastructure, applications, or databases risk full system compromise if attackers exploit this vulnerability. Attackers could gain root-level access, leading to data breaches, service disruptions, or deployment of persistent malware. Confidentiality of sensitive data could be lost, integrity of applications and configurations compromised, and availability of services disrupted. This is particularly concerning for sectors such as finance, healthcare, government, and critical infrastructure operators in Europe, where data protection regulations like GDPR impose strict requirements on data security. Additionally, the ability to execute arbitrary commands as root could facilitate lateral movement within networks, increasing the potential scale of attacks. The lack of known exploits in the wild provides a window for mitigation, but the high severity demands immediate attention to prevent potential targeted attacks.
Mitigation Recommendations
European organizations should immediately upgrade all Coolify instances to version 4.0.0-beta.451 or later to remediate this vulnerability. Until upgrades can be applied, restrict application/service management permissions to trusted administrators only, minimizing the number of users who can exploit this flaw. Implement strict access controls and monitor logs for unusual proxy configuration filename changes or suspicious shell command executions. Employ network segmentation to isolate Coolify-managed servers from critical network segments. Use host-based intrusion detection systems (HIDS) to detect anomalous root-level command executions. Regularly audit and rotate credentials for users with elevated permissions. Additionally, consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect and block exploitation attempts. Finally, maintain an incident response plan tailored to potential Coolify compromises to enable rapid containment and recovery.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-66212: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in coollabsio coolify
Description
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in the Dynamic Proxy Configuration Filename handling allows users with application/service management permissions to execute arbitrary commands as root on managed servers. Proxy configuration filenames are passed to shell commands without proper escaping, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-66212 is an OS command injection vulnerability classified under CWE-78 affecting Coolify, an open-source, self-hostable platform used for managing servers, applications, and databases. The vulnerability exists in versions prior to 4.0.0-beta.451 and stems from improper neutralization of special characters in proxy configuration filenames. Specifically, when Coolify processes dynamic proxy configuration filenames, these filenames are passed directly into shell commands without adequate escaping or sanitization. This flaw allows authenticated users who have application or service management permissions to inject arbitrary shell commands. Because these commands execute with root privileges on the managed servers, an attacker can achieve full remote code execution, potentially compromising the entire system. The vulnerability does not require user interaction beyond authentication and has a low attack complexity, making exploitation feasible for insiders or attackers who have obtained management credentials. The CVSS 4.0 score of 9.4 reflects the critical nature of this vulnerability, highlighting its impact on confidentiality, integrity, and availability, as well as the wide scope of affected systems. The issue was publicly disclosed on December 23, 2025, and fixed in version 4.0.0-beta.451. No public exploits have been reported yet, but the risk remains high due to the ease of exploitation and the level of access required.
Potential Impact
For European organizations, the impact of CVE-2025-66212 can be severe. Organizations using Coolify to manage critical infrastructure, applications, or databases risk full system compromise if attackers exploit this vulnerability. Attackers could gain root-level access, leading to data breaches, service disruptions, or deployment of persistent malware. Confidentiality of sensitive data could be lost, integrity of applications and configurations compromised, and availability of services disrupted. This is particularly concerning for sectors such as finance, healthcare, government, and critical infrastructure operators in Europe, where data protection regulations like GDPR impose strict requirements on data security. Additionally, the ability to execute arbitrary commands as root could facilitate lateral movement within networks, increasing the potential scale of attacks. The lack of known exploits in the wild provides a window for mitigation, but the high severity demands immediate attention to prevent potential targeted attacks.
Mitigation Recommendations
European organizations should immediately upgrade all Coolify instances to version 4.0.0-beta.451 or later to remediate this vulnerability. Until upgrades can be applied, restrict application/service management permissions to trusted administrators only, minimizing the number of users who can exploit this flaw. Implement strict access controls and monitor logs for unusual proxy configuration filename changes or suspicious shell command executions. Employ network segmentation to isolate Coolify-managed servers from critical network segments. Use host-based intrusion detection systems (HIDS) to detect anomalous root-level command executions. Regularly audit and rotate credentials for users with elevated permissions. Additionally, consider deploying runtime application self-protection (RASP) or endpoint detection and response (EDR) solutions to detect and block exploitation attempts. Finally, maintain an incident response plan tailored to potential Coolify compromises to enable rapid containment and recovery.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-11-24T23:01:29.678Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694b149ad69af40f3136cc7d
Added to database: 12/23/2025, 10:15:54 PM
Last enriched: 1/7/2026, 2:53:46 AM
Last updated: 2/7/2026, 2:14:46 PM
Views: 96
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighCVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.