Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66212: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in coollabsio coolify

0
Critical
VulnerabilityCVE-2025-66212cvecve-2025-66212cwe-78
Published: Tue Dec 23 2025 (12/23/2025, 22:04:18 UTC)
Source: CVE Database V5
Vendor/Project: coollabsio
Product: coolify

Description

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in the Dynamic Proxy Configuration Filename handling allows users with application/service management permissions to execute arbitrary commands as root on managed servers. Proxy configuration filenames are passed to shell commands without proper escaping, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.

AI-Powered Analysis

AILast updated: 12/23/2025, 22:27:34 UTC

Technical Analysis

CVE-2025-66212 is an OS command injection vulnerability classified under CWE-78 affecting Coolify, an open-source, self-hostable tool designed for managing servers, applications, and databases. The vulnerability arises from improper neutralization of special elements in proxy configuration filenames, which are passed unsanitized to shell commands. Specifically, in versions prior to 4.0.0-beta.451, users with application or service management permissions can manipulate the dynamic proxy configuration filename parameter to inject arbitrary shell commands. Because these commands execute with root privileges on managed servers, an attacker can achieve full remote code execution, compromising confidentiality, integrity, and availability of the affected systems. The vulnerability does not require user interaction but does require authentication with elevated privileges, which limits exploitation to authorized users but significantly raises the risk if credentials are compromised or insider threats exist. The CVSS 4.0 score of 9.4 reflects the critical nature of this flaw, highlighting its network attack vector, low attack complexity, no user interaction, and high impact on all security properties. No known exploits are currently reported in the wild, but the severity and ease of exploitation make it a high-priority patch. The fix was introduced in version 4.0.0-beta.451 by properly escaping or sanitizing proxy configuration filenames before shell execution, preventing injection. Organizations using Coolify for server orchestration, particularly those exposing management interfaces or using dynamic proxy configurations, must prioritize upgrading to the patched version to mitigate risk.

Potential Impact

The impact on European organizations using Coolify is substantial. Successful exploitation grants attackers root-level remote code execution on managed servers, enabling them to fully control critical infrastructure components, manipulate or exfiltrate sensitive data, disrupt services, or pivot within networks. This can lead to severe operational disruptions, data breaches, and compliance violations under regulations like GDPR. Since Coolify manages servers, applications, and databases, the compromise can cascade, affecting multiple layers of IT infrastructure. The requirement for authenticated access somewhat limits exposure but does not eliminate risk, especially in environments with weak access controls or compromised credentials. European organizations with internet-facing Coolify deployments or those using it in multi-tenant or cloud environments are particularly vulnerable. The critical severity and high CVSS score indicate that the vulnerability could be exploited for impactful attacks, including ransomware deployment or espionage. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

1. Immediately upgrade all Coolify instances to version 4.0.0-beta.451 or later, where the vulnerability is patched. 2. Restrict application and service management permissions strictly to trusted administrators to reduce the attack surface. 3. Implement strong authentication mechanisms, such as multi-factor authentication (MFA), to protect management interfaces. 4. Audit and sanitize all proxy configuration filenames and inputs manually if upgrading is delayed, ensuring no special shell characters are allowed. 5. Monitor logs for unusual command execution or proxy configuration changes indicative of exploitation attempts. 6. Isolate Coolify management interfaces from public networks using network segmentation or VPNs to limit exposure. 7. Regularly review and rotate credentials associated with Coolify to prevent unauthorized access. 8. Conduct penetration testing focused on command injection vectors in proxy configuration handling. 9. Educate administrators about the risks of command injection and the importance of applying patches promptly. 10. Maintain an incident response plan to quickly contain and remediate any detected exploitation.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-24T23:01:29.678Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694b149ad69af40f3136cc7d

Added to database: 12/23/2025, 10:15:54 PM

Last enriched: 12/23/2025, 10:27:34 PM

Last updated: 12/24/2025, 12:44:54 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats