Home

Description

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in the Database Backup functionality allows users with application/service management permissions to execute arbitrary commands as root on managed servers. Database names used in backup operations are passed directly to shell commands without sanitization, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.

PUBLISHED Reserved 2025-11-24 | Published 2025-12-23 | Updated 2025-12-24 | Assigner GitHub_M




CRITICAL: 9.4CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Product status

Default status
unaffected

Any version before 4.0.0-beta.451
affected

References

github.com/0xrakan/coolify-cve-2025-66209-66213

github.com/coollabsio/coolify/pull/7375

github.com/coollabsio/coolify/releases/tag/v4.0.0-beta.451

cve.org (CVE-2025-66209)

nvd.nist.gov (CVE-2025-66209)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.