CVE-2025-64421

8.0 HIGH

📋 TL;DR

This vulnerability allows low-privileged users in Coolify to invite themselves as administrators through a race condition exploit. By clicking the invite button twice, they can bypass authorization checks and gain administrative access to the Coolify instance. All Coolify instances running vulnerable versions are affected.

💻 Affected Systems

Products:
  • Coolify
Versions: All versions up to and including v4.0.0-beta.434
Operating Systems: All platforms running Coolify
Default Config Vulnerable: ⚠️ Yes
Notes: Any Coolify instance with user accounts is vulnerable. The vulnerability requires at least one low-privileged user account to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Coolify instance with administrative privileges, allowing attackers to manage all servers, applications, and databases, potentially leading to full infrastructure takeover.

🟠

Likely Case

Unauthorized administrative access leading to privilege escalation, allowing attackers to modify configurations, deploy malicious applications, or access sensitive data.

🟢

If Mitigated

Limited impact if proper network segmentation and monitoring are in place, though privilege escalation would still occur.

🌐 Internet-Facing: HIGH - If Coolify is exposed to the internet, attackers with any user account can exploit this vulnerability.
🏢 Internal Only: HIGH - Even internally, any compromised low-privileged account can escalate to administrator.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires a low-privileged user account and involves a simple race condition (double-clicking invite button). No advanced technical skills needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://github.com/coollabsio/coolify/security/advisories/GHSA-4p6r-m39m-9cm9

Restart Required: Yes

Instructions:

1. Monitor the GitHub security advisory for patch availability. 2. When patch is released, update to the fixed version. 3. Restart the Coolify service after updating.

🔧 Temporary Workarounds

Disable user invitations

all

Temporarily disable the user invitation functionality in Coolify to prevent exploitation.

Restrict user management

all

Limit user account creation and management to trusted administrators only.

🧯 If You Can't Patch

  • Isolate Coolify instance from the internet and restrict access to trusted networks only.
  • Implement strict monitoring of user invitation logs and administrative privilege changes.

🔍 How to Verify

Check if Vulnerable:

Check your Coolify version. If it's v4.0.0-beta.434 or earlier, you are vulnerable.

Check Version:

Check the Coolify web interface dashboard or run 'docker ps' if using Docker to see the container version.

Verify Fix Applied:

After patching, verify the version is newer than v4.0.0-beta.434 and test that low-privileged users cannot invite administrators.

📡 Detection & Monitoring

Log Indicators:

  • Multiple invitation attempts from low-privileged users
  • Administrative user invitations from non-admin accounts
  • Password reset requests for newly created admin accounts

Network Indicators:

  • Unusual authentication patterns
  • Multiple POST requests to invitation endpoints

SIEM Query:

source="coolify" AND (event="user_invitation" AND user_role="member") OR (event="password_reset" AND new_user_role="admin")

🔗 References

📤 Share & Export