Home

Description

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In Coolify versions up to and including v4.0.0-beta.434, an attacker can initiate a password reset for a victim, and modify the host header of the request to a malicious value. The victim will receive a password reset email, with a link to the malicious host. If the victim clicks this link, their reset token is sent to the attacker's server, allowing the attacker to use it to change the victim's password and takeover their account. As of time of publication, it is unclear if a patch is available.

PUBLISHED Reserved 2025-11-03 | Published 2026-01-05 | Updated 2026-01-05 | Assigner GitHub_M




HIGH: 8.5CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N

Problem types

CWE-644: Improper Neutralization of HTTP Headers for Scripting Syntax

Product status

<= 4.0.0-beta.434
affected

References

github.com/...oolify/security/advisories/GHSA-f737-2p93-g2cw exploit

github.com/...oolify/security/advisories/GHSA-f737-2p93-g2cw

drive.google.com/...lwVS2usAD7qmgH37Y4rw/view?usp=drive_link

cve.org (CVE-2025-64425)

nvd.nist.gov (CVE-2025-64425)

Download JSON