๐Ÿ” CVE Alert

CVE-2025-66213

UNKNOWN 0.0

Coolify Vulnerable to Authenticated Remote Code Execution via Command Injection in File Storage Directory Mount Path

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in the File Storage Directory Mount Path functionality allows users with application/service management permissions to execute arbitrary commands as root on managed servers. The file_storage_directory_source parameter is passed directly to shell commands without proper sanitization, enabling full remote code execution on the host system. Version 4.0.0-beta.451 fixes the issue.

CWE CWE-78
Vendor coollabsio
Product coolify
Published Dec 23, 2025
Last Updated Mar 17, 2026
Stay Ahead of the Next One

Get instant alerts for coollabsio coolify

Be the first to know when new unknown vulnerabilities affecting coollabsio coolify are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

coollabsio / coolify
< 4.0.0-beta.451

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/coollabsio/coolify/security/advisories/GHSA-cj2c-9jx8-j427 github.com: https://github.com/coollabsio/coolify/pull/7375 github.com: https://github.com/0xrakan/coolify-cve-2025-66209-66213 github.com: https://github.com/coollabsio/coolify/releases/tag/v4.0.0-beta.451