Unrated severityOSV Advisory· Published Jan 5, 2026· Updated Jan 5, 2026
Rate-limit bypass on login via X-Forwarded-Host header
CVE-2025-64422
Description
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In Coolify vstarting with version 4.0.0-beta.434, the /login endpoint advertises a rate limit of 5 requests but can be trivially bypassed by rotating the X-Forwarded-For header. This enables unlimited credential stuffing and brute-force attempts against user and admin accounts. As of time of publication, it is unclear if a patch is available.
Affected products
1- Range: 4.0.0-beta.39, 4.0.0-beta.40, v1.0.0, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- github.com/coollabsio/coolify/security/advisories/GHSA-688j-rm43-5r8xmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.