Unrated severityOSV Advisory· Published Jan 5, 2026· Updated Jan 5, 2026
Coolify vulnerable to command injection via docker-compose.yaml parameters
CVE-2025-64419
Description
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.445, parameters coming from docker-compose.yaml are not sanitized when used in commands. If a victim user creates an application from an attacker repository (using build pack "docker compose"), the attacker can execute commands on the Coolify instance as root. Version 4.0.0-beta.445 fixes the issue.
Affected products
1- Range: 4.0.0-beta.39, 4.0.0-beta.40, v1.0.0, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/coollabsio/coolify/commit/f86ccfaa9af572a5487da8ea46b0a125a4854cf6mitrex_refsource_MISC
- github.com/coollabsio/coolify/security/advisories/GHSA-234r-xrrg-m8f3mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.