Unrated severityOSV Advisory· Published Dec 23, 2025· Updated Mar 17, 2026
Coolify Vulnerable to Authenticated Remote Code Execution via Command Injection in Dynamic Proxy Configuration Filename
CVE-2025-66212
Description
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in the Dynamic Proxy Configuration Filename handling allows users with application/service management permissions to execute arbitrary commands as root on managed servers. Proxy configuration filenames are passed to shell commands without proper escaping, enabling full remote code execution. Version 4.0.0-beta.451 fixes the issue.
Affected products
1- Range: 4.0.0-beta.39, 4.0.0-beta.40, v1.0.0, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/coollabsio/coolify/pull/7375mitrex_refsource_MISC
- github.com/coollabsio/coolify/releases/tag/v4.0.0-beta.451mitrex_refsource_MISC
- github.com/coollabsio/coolify/security/advisories/GHSA-q7rg-2j7p-83gpmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.