CVE-2025-53825

9.4 CRITICAL

📋 TL;DR

CVE-2025-53825 is an unauthenticated remote code execution vulnerability in Dokploy's preview deployment feature. Any user can trigger arbitrary code execution and access sensitive environment variables by opening a pull request on a public repository. This affects all public Dokploy users using preview deployments prior to version 0.24.3.

💻 Affected Systems

Products:
  • Dokploy
Versions: All versions prior to 0.24.3
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects instances with preview deployments enabled for public repositories.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with attacker gaining full control over the Dokploy instance, accessing all secrets and environment variables, and potentially pivoting to other systems.

🟠

Likely Case

Unauthenticated attackers exfiltrate sensitive environment variables (API keys, database credentials) and execute arbitrary commands on the Dokploy host.

🟢

If Mitigated

If network segmentation and strict access controls are in place, impact may be limited to the Dokploy instance itself.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only opening a pull request on a public repository - no authentication or special privileges needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.24.3

Vendor Advisory: https://github.com/Dokploy/dokploy/security/advisories/GHSA-h67g-mpq5-6ph5

Restart Required: Yes

Instructions:

1. Stop Dokploy service. 2. Update to version 0.24.3 using your deployment method (Docker, manual). 3. Restart Dokploy service. 4. Verify the fix by checking version.

🔧 Temporary Workarounds

Disable preview deployments for public repositories

all

Temporarily disable preview deployment functionality for public repositories until patching can be completed.

Modify Dokploy configuration to disable preview deployments or restrict to private repositories only

🧯 If You Can't Patch

  • Disable preview deployment feature entirely in Dokploy configuration
  • Implement network segmentation to isolate Dokploy instance from sensitive systems

🔍 How to Verify

Check if Vulnerable:

Check if Dokploy version is below 0.24.3 and preview deployments are enabled for public repositories.

Check Version:

docker exec dokploy dokploy --version or check Dokploy web interface version

Verify Fix Applied:

Confirm Dokploy version is 0.24.3 or higher and test that unauthenticated pull requests no longer trigger preview deployments.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected preview deployment triggers from unauthenticated sources
  • Unusual process execution from Dokploy containers
  • Access to environment variables from unauthorized sources

Network Indicators:

  • Unusual outbound connections from Dokploy instance
  • Data exfiltration patterns from the Dokploy host

SIEM Query:

source="dokploy" AND (event="preview_deployment" OR event="pull_request") AND user="unauthenticated"

🔗 References

📤 Share & Export