Unrated severityOSV Advisory· Published Dec 23, 2025· Updated Mar 17, 2026
Coolify Vulnerable to Authenticated Remote Code Execution via Command Injection in File Storage Directory Mount Path
CVE-2025-66213
Description
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.451, an authenticated command injection vulnerability in the File Storage Directory Mount Path functionality allows users with application/service management permissions to execute arbitrary commands as root on managed servers. The file_storage_directory_source parameter is passed directly to shell commands without proper sanitization, enabling full remote code execution on the host system. Version 4.0.0-beta.451 fixes the issue.
Affected products
1- Range: 4.0.0-beta.39, 4.0.0-beta.40, v1.0.0, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- github.com/coollabsio/coolify/pull/7375mitrex_refsource_MISC
- github.com/coollabsio/coolify/releases/tag/v4.0.0-beta.451mitrex_refsource_MISC
- github.com/coollabsio/coolify/security/advisories/GHSA-cj2c-9jx8-j427mitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.