CVE-2025-66213
Coolify Vulnerable to Authenticated Remote Code Execution via Command Injection in File Storage Directory Mount Path
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in the File Storage Directory Mount Path functionality allows users with application/service management permissions to execute arbitrary commands as root on managed servers. The file_storage_directory_source parameter is passed directly to shell commands without proper sanitization, enabling full remote code execution on the host system. Version 4.0.0-beta.451 fixes the issue.
| CWE | CWE-78 |
| Vendor | coollabsio |
| Product | coolify |
| Published | Dec 23, 2025 |
| Last Updated | Mar 17, 2026 |
Stay Ahead of the Next One
Get instant alerts for coollabsio coolify
Be the first to know when new unknown vulnerabilities affecting coollabsio coolify are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
coollabsio / coolify
< 4.0.0-beta.451