• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances

You are here: Home / General Cyber Security News / Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances
January 8, 2026

Cybersecurity researchers have disclosed details of multiple critical-severity security flaws affecting Coolify, an open-source, self-hosting platform, that could result in authentication bypass and remote code execution.

The list of vulnerabilities is as follows –

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


  • CVE-2025-66209 (CVSS score: 10.0) – A command injection vulnerability in the database backup functionality allows any authenticated user with database backup permissions to execute arbitrary commands on the host server, resulting in container escape and full server compromise
  • CVE-2025-66210 (CVSS score: 10.0) – An authenticated command injection vulnerability in the database import functionality allows attackers to execute arbitrary commands on managed servers, leading to full infrastructure compromise
  • CVE-2025-66211 (CVSS score: 10.0) – A command injection vulnerability in the PostgreSQL init script management allows authenticated users with database permissions to execute arbitrary commands as root on the server
  • CVE-2025-66212 (CVSS score: 10.0) – An authenticated command injection vulnerability in the Dynamic Proxy Configuration functionality allows users with server management permissions to execute arbitrary commands as root on managed servers
  • CVE-2025-66213 (CVSS score: 10.0) – An authenticated command injection vulnerability in the File Storage Directory Mount functionality allows users with application/service management permissions to execute arbitrary commands as root on managed servers
  • CVE-2025-64419 (CVSS score: 9.7) – A command injection vulnerability via docker-compose.yaml that enables attackers to execute arbitrary system commands as root on the Coolify instance
  • CVE-2025-64420 (CVSS score: 10.0) – An information disclosure vulnerability that allows low-privileged users to view the private key of the root user on the Coolify instance, allowing them to gain unauthorized access to the server via SSH and authenticate as the root user using the key
  • CVE-2025-64424 (CVSS score: 9.4) – A command injection vulnerability was found in the git source input fields of a resource, allowing a low-privileged user (member) to execute system commands as root on the Coolify instance
  • CVE-2025-59156 (CVSS score: 9.4) – An operating system command injection vulnerability that allows a low-privileged user to inject arbitrary Docker Compose directives and achieve root-level command execution on the underlying host
  • CVE-2025-59157 (CVSS score: 10.0) – An operating system command injection vulnerability that allows a regular user to inject arbitrary shell commands that execute on the underlying server by using the Git Repository field during deployment
  • CVE-2025-59158 (CVSS score: 9.4) – An improper encoding or escaping of the data that allows an authenticated user with low privileges to conduct a stored cross-site scripting (XSS) attack during project creation that’s automatically executed in the browser context when an administrator later attempts to delete the project or its associated resource

Cybersecurity

The following versions are impacted by the shortcomings –

  • CVE-2025-66209, CVE-2025-66210, CVE-2025-66211 – <= 4.0.0-beta.448 (Fixed in >= 4.0.0-beta.451)
  • CVE-2025-66212, CVE-2025-66213 – <= 4.0.0-beta.450 (Fixed in >= 4.0.0-beta.451)
  • CVE-2025-64419 – < 4.0.0-beta.436 (Fixed in >= 4.0.0-beta.445)
  • CVE-2025-64420, CVE-2025-64424 – <= 4.0.0-beta.434 (Fix status unclear)
  • CVE-2025-59156, CVE-2025-59157, CVE-2025-59158 – <= 4.0.0-beta.420.6 (Fixed in 4.0.0-beta.420.7)

Source: Censys

According to data from attack surface management platform Censys, there are about 52,890 exposed Coolify hosts as of January 8, 2026, with most of them located in Germany (15,000), the U.S. (9,800), France (8,000), Brazil (4,200), and Finland (3,400)

While there are no indications that any of the flaws have been exploited in the wild, it’s essential that users move quickly to apply the fixes as soon as possible in light of their severity.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «openai launches chatgpt health with isolated, encrypted health data controls OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances
  • OpenAI Launches ChatGPT Health with Isolated, Encrypted Health Data Controls
  • CISA Flags Microsoft Office and HPE OneView Bugs as Actively Exploited
  • Black Cat Behind SEO Poisoning Malware Campaign Targeting Popular Software Searches
  • Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control
  • Webinar: Learn How AI-Powered Zero Trust Detects Attacks with No Files or Indicators
  • n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions
  • The Future of Cybersecurity Includes Non-Human Employees
  • Veeam Patches Critical RCE Vulnerability with CVSS 9.0 in Backup & Replication
  • Microsoft Warns Misconfigured Email Routing Can Enable Internal Domain Phishing

Copyright © TheCyberSecurity.News, All Rights Reserved.