CVE-2025-59157

CRITICAL
2026-01-05 [email protected]
9.9
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
PoC Detected
Jan 12, 2026 - 15:02 vuln.today
Public exploit code
CVE Published
Jan 05, 2026 - 18:15 nvd
CRITICAL 9.9

Description

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.420.7, the Git Repository field during project creation is vulnerable to command injection. User input is not properly sanitized, allowing attackers to inject arbitrary shell commands that execute on the underlying server during the deployment workflow. A regular member user can exploit this vulnerability. Version 4.0.0-beta.420.7 contains a patch for the issue.

Analysis

Coolify, a self-hosted server management platform, allows authenticated users to inject OS commands through the Git Repository field during project creation. A regular member can achieve root-level code execution on the Coolify host with scope change. PoC available.

Technical Context

The Git Repository URL is passed to shell commands during deployment without sanitization (CWE-78). Since Coolify manages servers with root-level SSH access, command execution in this context provides full server control. The scope change reflects that compromising Coolify gives access to all managed servers.

Affected Products

Coolify before 4.0.0-beta.420.7

Remediation

Update to Coolify 4.0.0-beta.420.7 or later. Review team member access. Audit deployment logs for suspicious Git URLs.

Priority Score

70
Low Medium High Critical
KEV: 0
EPSS: +0.3
CVSS: +50
POC: +20

Share

CVE-2025-59157 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy