CVE-2025-64424
HIGH WAF: High
CVSS 8.8
Published: 2026-01-05
CWE-77
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In Coolify versions up to and including v4.0.0-beta.434, a command injection vulnerability exists in the git source input fields of a resource, allowing a low privileged user (member) to execute system commands as root on the Coolify instance. As of time of publication, it is unclear if a patch is available.
WAF Coverage Analysis
Command Injection
High WAF Coverage
OWASP: A03:2021 Injection
932xxx - Remote Code Execution
Affected Software
| Vendor | Product | Version |
|---|---|---|
| coollabs | coolify | up to 4.0.0 |
| coollabs | coolify | 4.0.0 |
| coollabs | coolify | 4.0.0 |
| coollabs | coolify | 4.0.0 |
| coollabs | coolify | 4.0.0 |
| coollabs | coolify | 4.0.0 |
| coollabs | coolify | 4.0.0 |
| coollabs | coolify | 4.0.0 |
| coollabs | coolify | 4.0.0 |
| coollabs | coolify | 4.0.0 |
References
- drive.google.com (Exploit)
- github.com (Exploit, Vendor Advisory)