PT-2025-52855 · Coolify · Coolify
0Xrakan
·
Published
2025-12-23
·
Updated
2026-01-12
·
CVE-2025-66212
CVSS v4.0
9.4
Critical
| AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H |
Name of the Vulnerable Software and Affected Versions
Coolify versions prior to 4.0.0-beta.451
Description
Coolify is a self-hostable tool for managing servers, applications, and databases. A command injection issue exists in the Dynamic Proxy Configuration Filename handling. Authenticated users with application/service management permissions can execute arbitrary commands as root on managed servers. The issue occurs because proxy configuration filenames are passed to shell commands without proper escaping, allowing for full remote code execution via the
filename parameter.Recommendations
Update to version 4.0.0-beta.451 or later.
Exploit
Fix
RCE
OS Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Coolify