CVE-2025-59157
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Lifecycle Timeline
3Tags
Description
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.420.7, the Git Repository field during project creation is vulnerable to command injection. User input is not properly sanitized, allowing attackers to inject arbitrary shell commands that execute on the underlying server during the deployment workflow. A regular member user can exploit this vulnerability. Version 4.0.0-beta.420.7 contains a patch for the issue.
Analysis
Coolify, a self-hosted server management platform, allows authenticated users to inject OS commands through the Git Repository field during project creation. A regular member can achieve root-level code execution on the Coolify host with scope change. PoC available.
Technical Context
The Git Repository URL is passed to shell commands during deployment without sanitization (CWE-78). Since Coolify manages servers with root-level SSH access, command execution in this context provides full server control. The scope change reflects that compromising Coolify gives access to all managed servers.
Affected Products
Coolify before 4.0.0-beta.420.7
Remediation
Update to Coolify 4.0.0-beta.420.7 or later. Review team member access. Audit deployment logs for suspicious Git URLs.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today