Home

Description

Coolify versions prior to v4.0.0-beta.420.7 are vulnerable to a remote code execution vulnerability in the project deployment workflow. The platform allows authenticated users, with low-level member privileges, to inject arbitrary shell commands via the Git Repository field during project creation. By submitting a crafted repository string containing command injection syntax, an attacker can execute arbitrary commands on the underlying host system, resulting in full server compromise.

PUBLISHED Reserved 2025-04-15 | Published 2025-08-27 | Updated 2025-08-27 | Assigner VulnCheck




CRITICAL: 9.4CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

CWE-20 Improper Input Validation

Product status

Default status
unaffected

* before 4.0.0.-beta.420.7
affected

Credits

Mike G.A (Eyodav) finder

References

github.com/coollabsio/coolify/releases/tag/v4.0.0-beta.420.7 vendor-advisory patch

coolify.io/ product

github.com/Eyodav/CVE-2025-34161 technical-description exploit

cve.org (CVE-2025-34161)

nvd.nist.gov (CVE-2025-34161)

Download JSON