Is Your Coolify Server Vulnerable to Takeover?

Article Highlights
Off On

A recently published comprehensive security disclosure has brought to light a series of 11 critical vulnerabilities within the Coolify open-source platform, placing tens of thousands of self-hosted servers at immediate risk of complete takeover. This alarming discovery, detailed by cybersecurity researchers, underscores a significant threat to users who rely on the self-hosting solution for managing their applications and services. The majority of these identified flaws have been assigned the highest possible CVSS severity score of 10.0, indicating a level of criticality that demands immediate attention from administrators. The core issue revolves around multiple avenues for command injection, allowing attackers—in some instances, those with only minimal user privileges—to execute arbitrary commands on the host server with the highest level of system access. With an estimated 52,890 Coolify instances exposed online across the globe, primarily in Germany, the United States, and France, the potential for widespread compromise is substantial. This situation highlights the inherent risks of self-hosted infrastructure and the paramount importance of vigilant security practices and timely software updates.

The Anatomy of a Compromise

The central and most pervasive threat across the discovered vulnerabilities is command injection, a classic yet devastating attack vector that grants unauthorized command execution on the underlying server. In the case of Coolify, these flaws are deeply embedded within numerous core platform functionalities, creating multiple pathways for exploitation by an authenticated user. For example, critical injection vulnerabilities were identified in essential database management features. The handling of PostgreSQL initialization scripts (CVE-2025-66211), as well as database backup (CVE-2025-66209) and import (CVE-2025-66210) operations, were all found to be susceptible. An attacker with the necessary permissions to manage databases could craft malicious inputs for these functions, which would then be executed directly by the system with root privileges. This provides a direct line to full server control. Similarly, high-impact injection flaws were discovered in the Dynamic Proxy Configuration (CVE-2025-66212) and File Storage Directory Mount (CVE-2025-66213) services, further expanding the attack surface for users with specific management roles.

Further compounding the platform’s security posture, several of the most severe vulnerabilities arise from the improper sanitization and handling of user-provided configuration data, a fundamental aspect of the platform’s operation. This category of flaws allows attackers to achieve root-level command execution by embedding malicious commands within otherwise standard configuration files and input fields. One significant vulnerability (CVE-2025-64419) permits an attacker to inject malicious shell commands into a docker-compose.yaml file, which are then executed when the service is deployed or updated. Other attack vectors target the git integration, where malicious commands can be injected into git source input fields (CVE-2025-64424, CVE-2025-59157) or Docker Compose directives (CVE-2025-59156). What makes these particular vulnerabilities exceptionally dangerous is that they can be exploited by users with standard or “member-level” privileges. This effectively creates a straightforward and low-barrier method for privilege escalation, allowing a regular user to elevate their access to full root control over the entire host system with minimal effort.

Beyond Direct Command Execution

While command injection represents the most common attack vector, the security disclosure also revealed critical flaws that bypass the need for command execution entirely, offering attackers a more direct path to compromise. A particularly alarming information disclosure vulnerability (CVE-2025-64420) was uncovered, which allows a low-privileged authenticated user to gain access to the private SSH key belonging to the root user on the Coolify instance. This flaw is catastrophic, as it effectively hands an attacker the keys to the kingdom. With the root SSH key in hand, an adversary can establish a direct, fully authenticated remote session on the server, granting them persistent and unfettered root access without having to exploit any other flaw. This circumvents many common security monitoring tools that might otherwise detect suspicious command execution. In a separate but also serious issue, a stored cross-site scripting (XSS) vulnerability (CVE-2025-59158) was identified. An authenticated user could inject a malicious script during the project creation process. This script would remain dormant until an administrator later performs an action, such as deleting the project, at which point it executes within the administrator’s browser, potentially leading to session hijacking or further system compromise.

A Call for Immediate Remediation

The disclosure of these vulnerabilities impacted a range of Coolify v4.0.0 beta builds, specifically up to and including version 4.0.0-beta.450. In response to the findings, developers issued patches in several subsequent releases, including 4.0.0-beta.420.7, 4.0.0-beta.445, and 4.0.0-beta.451, which addressed the majority of the critical issues. Although the patch status for two of the CVEs remained unconfirmed at the time of the report, the release of these updated versions provided a clear path to mitigation for concerned administrators. While there were no public reports of these flaws being actively exploited in the wild, the extreme severity ratings and the straightforward nature of several exploitation paths created a scenario where preventative action was essential. The event served as a crucial reminder for the self-hosting community that the convenience and control offered by platforms like Coolify come with the responsibility of diligent security maintenance. The potential for complete infrastructure compromise made it imperative for all users to verify their instance versions and upgrade to the latest patched releases without delay to secure their servers from potential takeover.

Explore more

Effective Email Automation Strategies Drive Business Growth

The digital landscape is currently witnessing a silent revolution where the most successful marketing teams have stopped competing for attention through volume and started winning through surgical precision. While many organizations continue to struggle with the exhausting cycle of manual campaign creation, a sophisticated subset of the market has mastered the art of “set it and forget it” revenue generation.

How Can Modern Email Marketing Drive Exceptional ROI?

Every second, millions of digital messages flood into global inboxes, yet only a tiny fraction of these communications actually manage to convert a passive reader into a loyal, high-value customer. While the average marketer often points to a return of thirty-six dollars for every dollar spent as a benchmark of success, this figure represents a mere starting point for organizations

Modern Tactics Drive High-Performance Email Marketing

The sheer volume of digital correspondence flooding the modern consumer’s primary inbox has reached a point where generic messaging is no longer merely ignored but actively penalized by sophisticated filtering algorithms. As the global email ecosystem navigates a staggering daily volume of nearly 400 billion messages, the traditional “spray and pray” methodology has transformed from a sub-optimal tactic into a

How Will AI-Native 6G Networks Change Global Connectivity?

Global telecommunications are currently undergoing a profound metamorphosis that transcends simple speed upgrades, aiming instead to weave an intelligent fabric directly into the world’s physical reality. While the transition from 4G to 5G was defined by raw speed and reduced latency, the move toward 6G represents a fundamental departure from traditional telecommunications. The industry is moving toward a reality where

How Is AI Redefining the Future of 6G and Telecom Security?

The sheer velocity of data surging through modern global telecommunications has already pushed traditional human-centric management systems toward a breaking point that demands a complete architectural overhaul. While the industry previously celebrated the arrival of high-speed mobile broadband, the current shift represents a fundamental departure from hardware-heavy engineering toward a software-defined, intelligent ecosystem. This evolution marks a pivotal moment where