Home

Description

Coolify versions prior to v4.0.0-beta.420.6 are vulnerable to a stored cross-site scripting (XSS) attack in the project creation workflow. An authenticated user with low privileges can create a project with a maliciously crafted name containing embedded JavaScript. When an administrator attempts to delete the project or its associated resource, the payload executes in the admin’s browser context. This results in full compromise of the Coolify instance, including theft of API tokens, session cookies, and access to WebSocket-based terminal sessions on managed servers.

PUBLISHED Reserved 2025-04-15 | Published 2025-08-27 | Updated 2025-08-27 | Assigner VulnCheck




CRITICAL: 9.4CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting')

CWE-20 Improper Input Validation

Product status

Default status
unaffected

* before 4.0.0.-beta.420.7
affected

Credits

Mike G.A (Eyodav) finder

References

github.com/coollabsio/coolify/releases/tag/v4.0.0-beta.420.7 vendor-advisory patch

coolify.io/ product

github.com/Eyodav/CVE-2025-34157 technical-description exploit

cve.org (CVE-2025-34157)

nvd.nist.gov (CVE-2025-34157)

Download JSON