CVE-2025-64419

9.6 CRITICAL

📋 TL;DR

This vulnerability allows remote command execution as root on Coolify instances when users create applications from malicious repositories using the docker compose build pack. Attackers can exploit unsanitized parameters from docker-compose.yaml files to execute arbitrary commands. All Coolify instances running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Coolify
Versions: All versions prior to 4.0.0-beta.445
Operating Systems: All platforms running Coolify
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is present when using the docker compose build pack feature. Requires user interaction to deploy from a malicious repository.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full compromise of the Coolify instance with root privileges, allowing attackers to steal credentials, deploy backdoors, pivot to other systems, and destroy or encrypt data.

🟠

Likely Case

Attackers create malicious repositories and trick users into deploying them, gaining root access to execute commands, install malware, or exfiltrate sensitive data from the Coolify server.

🟢

If Mitigated

With network segmentation and strict repository controls, impact is limited to the Coolify instance itself, though root access still provides significant control over that system.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires social engineering to trick users into deploying from malicious repositories. Once deployed, command execution is straightforward.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.0-beta.445

Vendor Advisory: https://github.com/coollabsio/coolify/security/advisories/GHSA-234r-xrrg-m8f3

Restart Required: Yes

Instructions:

1. Update Coolify to version 4.0.0-beta.445 or later. 2. Restart the Coolify service. 3. Verify the update was successful by checking the version.

🔧 Temporary Workarounds

Disable docker compose build pack

all

Temporarily disable the vulnerable docker compose build pack feature until patching is possible.

Modify Coolify configuration to disable docker compose build pack functionality

Restrict repository sources

all

Only allow deployments from trusted, verified repositories to prevent malicious payloads.

Configure Coolify to whitelist specific trusted repositories only

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Coolify instances from critical systems
  • Enable detailed logging and monitoring for suspicious docker compose activities and command execution

🔍 How to Verify

Check if Vulnerable:

Check if Coolify version is below 4.0.0-beta.445 and if docker compose build pack feature is enabled.

Check Version:

coolify --version or check Coolify web interface settings

Verify Fix Applied:

Confirm Coolify version is 4.0.0-beta.445 or higher and test docker compose functionality with safe test repositories.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution patterns from docker compose processes
  • Suspicious repository deployments with unexpected parameters
  • Root privilege escalation attempts

Network Indicators:

  • Unexpected outbound connections from Coolify instance
  • Downloads from unknown or suspicious repositories

SIEM Query:

process.name:docker-compose AND (command_line:*sh* OR command_line:*bash* OR command_line:*curl* OR command_line:*wget*)

🔗 References

📤 Share & Export