WZ-IT Logo

Coolify CVE Overview 2025/2026: Critical Vulnerabilities and Urgent Update Required

Timo Wevelsiep
Timo Wevelsiep
#Coolify #CVE #Security #RCE #CommandInjection #DevOps #SelfHosted

Running Coolify and need help with secure operations or updates? WZ-IT offers Coolify installation, maintenance, and security hardening. Schedule a free consultation: Book appointment.

Coolify is a popular self-hosted PaaS platform and alternative to Heroku, Netlify, or Vercel. The platform orchestrates deployments and server automation – which is exactly what makes the current security vulnerabilities so critical: Coolify inherently performs privileged operations, often with root privileges on the host system.

According to data from attack surface management platform Censys, as of January 8, 2026, there are 52,890 Coolify instances publicly accessible worldwide. Germany leads this statistic with 15,000 exposed hosts, followed by the USA (9,800), France (8,000), Brazil (4,200), and Finland (3,400).

No active attacks have been observed so far. Given the severity of the vulnerabilities – multiple CVEs with CVSS score 10.0 – an immediate update to at least version 4.0.0-beta.451 is strongly recommended.

Table of Contents

Critical: RCE & Command Injection

These CVEs are particularly critical because user input ends up unsanitized in shell commands – resulting in Remote Code Execution up to root.

CVE Vulnerability Attack Vector Impact Affected Versions Fix
CVE-2025-66209 Command Injection in Database Backup (DB name unsanitized) Remote, authenticated, DB backup permissions RCE as root on managed servers < 4.0.0-beta.451 4.0.0-beta.451
CVE-2025-66210 Command Injection in Database Import Remote, authenticated, App/Service management rights RCE as root < 4.0.0-beta.451 4.0.0-beta.451
CVE-2025-66211 Command Injection via PostgreSQL Init Script Filename Remote, authenticated, DB permissions RCE as root < 4.0.0-beta.451 4.0.0-beta.451
CVE-2025-66212 Command Injection via Dynamic Proxy Configuration Filename Remote, authenticated, Server management rights RCE as root < 4.0.0-beta.451 4.0.0-beta.451
CVE-2025-66213 Command Injection via File Storage Directory Mount Path Remote, authenticated, App/Service management rights RCE as root < 4.0.0-beta.451 4.0.0-beta.451
CVE-2025-64419 Unsanitized parameters from docker-compose.yaml Supply-chain: victim creates app from attacker repo Commands as root < 4.0.0-beta.445 4.0.0-beta.445
CVE-2025-64424 Command Injection in Git source input fields Remote, authenticated, low-priv member RCE as root ≤ 4.0.0-beta.434 Patched
CVE-2025-59156 Docker Compose Directive Injection (Host FS mount) Remote, authenticated, low-priv member Root-level RCE on host < 4.0.0-beta.420.7 4.0.0-beta.420.7
CVE-2025-59157 Command Injection in Git Repository field Remote, authenticated, member RCE in deployment context < 4.0.0-beta.420.7 4.0.0-beta.420.7

Core Problem: Multiple independent code paths (DB backup/import, proxy configuration, storage mounts, Git fields, Compose) implement the "User Input → Shell" pattern without sufficient validation.

Account Takeover & Privilege Escalation

These CVEs are particularly relevant for multi-user setups or when inviting users you don't fully trust.

CVE Vulnerability Attack Vector Impact Affected Versions Fix
CVE-2025-64421 Invite flow: Member can invite themselves as Admin Remote, authenticated, low-priv member Privilege Escalation → Admin ≤ 4.0.0-beta.434 Patched
CVE-2025-64423 Member can view Admin invitation links Remote, authenticated, low-priv member Privilege Escalation → Admin ≤ 4.0.0-beta.434 Patched
CVE-2025-64425 Host Header Injection in password reset Remote, no auth, user interaction required Account Takeover via reset token ≤ 4.0.0-beta.434 Patched
CVE-2025-64422 Rate-Limit Bypass at /login via X-Forwarded-For Remote, unauth, brute force possible Increased risk of account compromise from 4.0.0-beta.434 Patched

Information Disclosure / Secret Leakage

CVE Vulnerability Attack Vector Impact Affected Versions Fix
CVE-2025-64420 Low-priv user can view root user's private key Remote, authenticated, low-priv SSH as root → full compromise ≤ 4.0.0-beta.434 Patched
CVE-2025-59955 API leak: email_change_code via team member endpoints Remote, authenticated, team member Unauthorized email change possible ≤ 4.0.0-beta.420.8 Unclear

Client-Side: Stored XSS

CVE Vulnerability Attack Vector Impact Affected Versions Fix
CVE-2025-59158 Stored XSS via Project Name Remote, authenticated, low-priv member, admin performs delete action Session hijacking in admin context ≤ 4.0.0-beta.420.6 4.0.0-beta.420.7

Older Relevant CVEs (2025)

These CVEs are not the most recent but target the same fundamental class: missing authorization for sensitive operations.

CVE Vulnerability Impact Affected Versions Fix
CVE-2025-22609 Auth user can attach existing private key to own server config Can lead to RCE/server compromise < 4.0.0-beta.361 4.0.0-beta.361
CVE-2025-22611 Auth user can escalate roles (up to Owner) / remove others Privilege escalation, control over team/instance < 4.0.0-beta.361 4.0.0-beta.361
CVE-2025-22612 Auth user can read private keys in plaintext Secret leakage → server compromise < 4.0.0-beta.374 4.0.0-beta.374

Affected Versions Overview

Version Status
< 4.0.0-beta.361 Critical – missing authorization for keys/roles
< 4.0.0-beta.374 Critical – Private Key leakage
< 4.0.0-beta.420.7 Critical – Compose Injection, Git-Repo Injection, XSS
< 4.0.0-beta.445 Critical – docker-compose.yaml Command Injection
< 4.0.0-beta.451 Critical – 5× Command Injection (DB, Proxy, Storage)
≥ 4.0.0-beta.451 Recommended – all known critical CVEs patched

Typical Attack Chains

Without detailing exploits, attacks typically follow this pattern:

  1. Initial Access: Attacker gains low-priv access (Member) or exploits auth flow weakness (Invite/Reset/Brute force)
  2. Privilege Escalation / RCE: From Member context, achieves root Code Execution via Command Injection or Compose Injection
  3. Lateral Movement/Impact: Access to keys/host/SSH → compromise of additional systems

Hardening and Mitigation Recommendations

Patch/Upgrade (Priority 1)

Upgrade to ≥ 4.0.0-beta.451 is the most important step. This version fixes:

  • All 5 critical Command Injection CVEs (66209-66213)
  • docker-compose.yaml parameter issue (64419)
  • Compose/Git-Repo Injection & Stored XSS (59156/59157/59158)

Defense-in-Depth (for Multi-User Setups)

  • Configure RBAC restrictively: Keep member rights minimal; assign App/Service management only to trusted roles
  • Secure invitation/reset flows: Strict link handling, host header validation, logging/alerting
  • Brute force resilience: Enforce rate limits server-side via reverse proxy/WAF
  • Key hygiene: Rotate private keys, minimize root SSH, separate keys per server/team

Network Level

  • Don't expose Coolify admin interface publicly
  • Restrict access via VPN or IP whitelist
  • Set up monitoring for unusual API calls

Our Approach at WZ-IT

At WZ-IT, we help organizations run Coolify securely:

  • Security Audit: Review of your existing Coolify installation for known vulnerabilities
  • Managed Updates: Regular, tested updates without downtime
  • Hardening: RBAC configuration, network segmentation, monitoring
  • Installation: Secure new installation with best practices

Learn more about our Coolify services: Coolify Expertise | Installation & Setup

Further Resources


Conclusion: Coolify is a powerful tool for self-hosted deployments – but with great power comes great responsibility. The current CVEs demonstrate that consistent patching is essential for orchestration platforms. Update to ≥ 4.0.0-beta.451 and review your RBAC configuration.

Need help with updating or security hardening your Coolify instance? Contact us – we're happy to help.

Frequently Asked Questions

Answers to important questions about this topic

Currently, version 4.0.0-beta.451 or higher should be used. This version fixes all critical Command Injection CVEs (CVE-2025-66209 through CVE-2025-66213). Patches for older CVEs are available in earlier versions.

Most CVEs require authentication but can be exploited with low privileges (Member role). Some, like the Host Header Injection bug (CVE-2025-64425), don't require authentication but need user interaction.

The Command Injection CVEs (CVE-2025-66209 through CVE-2025-66213) all have a CVSS score of 10.0 and enable Remote Code Execution as root on the host system. An authenticated attacker can take over the entire server infrastructure.

As of January 2026, no active exploits in the wild are known. Given the severity (CVSS 10.0) and 52,890 publicly accessible instances worldwide, an immediate update is strongly recommended.

Let's Talk About Your Idea

Whether a specific IT challenge or just an idea – we look forward to the exchange. In a brief conversation, we'll evaluate together if and how your project fits with WZ-IT.

Trusted by leading companies

  • Keymate
  • SolidProof
  • Rekorder
  • Führerscheinmacher
  • ARGE
  • NextGym
  • Paritel
  • EVADXB
  • Boese VA
  • Maho Management
  • Aphy
  • Negosh
  • Millenium
  • Yonju
  • Mr. Clipart
Timo Wevelsiep & Robin Zins - CEOs of WZ-IT

Timo Wevelsiep & Robin Zins

CEOs of WZ-IT

1/3 – Topic Selection33%

What is your inquiry about?

Select one or more areas where we can support you.