CVE-2025-66212
Coolify Vulnerable to Authenticated Remote Code Execution via Command Injection in Dynamic Proxy Configuration Filename
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in the Dynamic Proxy Configuration Filename handling allows users with application/service management permissions to execute arbitrary commands as root on managed servers. Proxy configuration filenames are passed to shell commands without proper escaping, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.
| CWE | CWE-78 |
| Vendor | coollabsio |
| Product | coolify |
| Published | Dec 23, 2025 |
| Last Updated | Mar 17, 2026 |
Stay Ahead of the Next One
Get instant alerts for coollabsio coolify
Be the first to know when new unknown vulnerabilities affecting coollabsio coolify are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
coollabsio / coolify
< 4.0.0-beta.451