CVE-2025-64420

9.9 CRITICAL

📋 TL;DR

This vulnerability allows low-privileged users in Coolify to view the root user's private SSH key, enabling them to authenticate as root on the server. All Coolify instances running vulnerable versions are affected, potentially giving attackers complete system control.

💻 Affected Systems

Products:
  • Coolify
Versions: All versions up to and including v4.0.0-beta.434
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments where low-privileged user accounts exist.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root access, data exfiltration, lateral movement, and persistent backdoor installation.

🟠

Likely Case

Unauthorized root access leading to application and data manipulation, privilege escalation, and potential ransomware deployment.

🟢

If Mitigated

Limited impact if proper network segmentation, monitoring, and least privilege principles are enforced.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires low-privileged user access; exploitation is straightforward once credentials are obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://github.com/coollabsio/coolify/security/advisories/GHSA-qwxj-qch7-whpc

Restart Required: Yes

Instructions:

Monitor the GitHub advisory for patch availability. Once patched, update to the fixed version and restart Coolify services.

🔧 Temporary Workarounds

Restrict SSH key access

linux

Change permissions on root's SSH private key to prevent unauthorized access.

chmod 600 /root/.ssh/id_rsa
chown root:root /root/.ssh/id_rsa

Disable low-privileged accounts

all

Temporarily disable or remove low-privileged user accounts in Coolify.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Coolify instances from critical systems.
  • Enable detailed logging and monitoring for SSH authentication attempts and unusual root activity.

🔍 How to Verify

Check if Vulnerable:

Check Coolify version via web interface or configuration files; if version is ≤ v4.0.0-beta.434, it is vulnerable.

Check Version:

Check the Coolify web dashboard or configuration files for version information.

Verify Fix Applied:

After applying workarounds, verify that low-privileged users cannot access /root/.ssh/id_rsa or authenticate as root via SSH.

📡 Detection & Monitoring

Log Indicators:

  • Failed or successful SSH login attempts as root from unexpected IPs
  • Access to /root/.ssh/id_rsa by non-root users

Network Indicators:

  • SSH connections to Coolify server on port 22 from unauthorized sources

SIEM Query:

source="auth.log" AND (event="Accepted publickey for root" OR event="Failed password for root")

🔗 References

📤 Share & Export