Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66213: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in coollabsio coolify

0
Critical
VulnerabilityCVE-2025-66213cvecve-2025-66213cwe-78
Published: Tue Dec 23 2025 (12/23/2025, 22:06:38 UTC)
Source: CVE Database V5
Vendor/Project: coollabsio
Product: coolify

Description

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in the File Storage Directory Mount Path functionality allows users with application/service management permissions to execute arbitrary commands as root on managed servers. The file_storage_directory_source parameter is passed directly to shell commands without proper sanitization, enabling full remote code execution on the host system. Version 4.0.0-beta.451 fixes the issue.

AI-Powered Analysis

AILast updated: 01/07/2026, 02:54:07 UTC

Technical Analysis

CVE-2025-66213 is an OS command injection vulnerability identified in Coolify, an open-source, self-hostable platform used for managing servers, applications, and databases. The vulnerability exists in versions prior to 4.0.0-beta.451 within the File Storage Directory Mount Path functionality. Specifically, the file_storage_directory_source parameter is passed directly to shell commands without proper sanitization or neutralization of special characters, which allows an attacker with authenticated access and application/service management permissions to inject arbitrary OS commands. These commands execute with root privileges on the managed servers, leading to full remote code execution (RCE). The vulnerability is classified under CWE-78 (Improper Neutralization of Special Elements used in an OS Command). The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) reflects a network attack vector with low complexity, no user interaction, and privileges required but with high impact on confidentiality, integrity, and availability. No public exploits have been reported yet, but the severity and ease of exploitation make this a critical threat. The patch was released in version 4.0.0-beta.451, which properly sanitizes the input to prevent command injection. Organizations relying on Coolify should prioritize upgrading and review access controls to mitigate risk.

Potential Impact

The impact of CVE-2025-66213 on European organizations is significant due to the potential for complete system compromise. Successful exploitation allows attackers to execute arbitrary commands as root, leading to full control over managed servers, including data theft, service disruption, and lateral movement within networks. This can result in loss of confidentiality, integrity, and availability of critical infrastructure and applications. European enterprises using Coolify for managing production environments, especially in sectors like finance, healthcare, and critical infrastructure, face heightened risks. The vulnerability could facilitate ransomware deployment, espionage, or sabotage. Additionally, regulatory compliance risks arise under GDPR and NIS Directive due to potential data breaches and service outages. The absence of known exploits in the wild provides a window for proactive mitigation, but the critical severity demands immediate attention to prevent exploitation.

Mitigation Recommendations

To mitigate CVE-2025-66213, European organizations should: 1) Immediately upgrade Coolify installations to version 4.0.0-beta.451 or later, which contains the fix for the command injection vulnerability. 2) Restrict access to Coolify management interfaces to trusted administrators only, using network segmentation, VPNs, or zero-trust access controls. 3) Audit and minimize permissions granted to users, ensuring only necessary application/service management rights are assigned. 4) Implement monitoring and alerting for unusual command execution or privilege escalation activities on managed servers. 5) Conduct regular security assessments and penetration tests focusing on server management tools. 6) Apply host-based intrusion detection systems (HIDS) to detect anomalous root-level command executions. 7) Maintain up-to-date backups and incident response plans to quickly recover from potential compromises. 8) Educate administrators about the risks of command injection vulnerabilities and safe configuration practices. These steps go beyond generic advice by focusing on access control, monitoring, and rapid patch deployment tailored to the Coolify environment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-24T23:01:29.678Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694b149ad69af40f3136cc82

Added to database: 12/23/2025, 10:15:54 PM

Last enriched: 1/7/2026, 2:54:07 AM

Last updated: 2/7/2026, 12:41:33 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats