CVE-2025-64423

8.8 HIGH

📋 TL;DR

In Coolify versions up to v4.0.0-beta.434, low-privileged users (members) can intercept and use administrator invitation links before the intended recipient. This allows privilege escalation to administrator level, potentially compromising the entire Coolify instance. All Coolify deployments using vulnerable versions are affected.

💻 Affected Systems

Products:
  • Coolify
Versions: All versions up to and including v4.0.0-beta.434
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Any Coolify instance with both administrator and member users is vulnerable. The vulnerability exists in the invitation link handling mechanism.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative control over the Coolify instance, allowing them to deploy malicious applications, access sensitive data, modify server configurations, and potentially compromise underlying infrastructure.

🟠

Likely Case

A malicious insider or compromised low-privilege account escalates to administrator privileges, gaining unauthorized access to sensitive management functions and potentially other systems managed through Coolify.

🟢

If Mitigated

With proper access controls and monitoring, the impact is limited to temporary unauthorized access that can be detected and revoked before significant damage occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires an existing low-privilege account (member). The attack involves monitoring for invitation links and using them before the legitimate administrator.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://github.com/coollabsio/coolify/security/advisories/GHSA-4fqm-797g-7m6j

Restart Required: Yes

Instructions:

1. Monitor the Coolify GitHub repository for security updates. 2. Apply the patch when available. 3. Restart the Coolify service after patching.

🔧 Temporary Workarounds

Disable invitation system

all

Temporarily disable user invitations to prevent exploitation

# Modify Coolify configuration to disable invitations
# Check documentation for specific configuration options

Restrict member access

all

Limit member accounts to only trusted users and monitor their activity

# Review and audit all member accounts
# Implement strict access controls

🧯 If You Can't Patch

  • Monitor invitation logs for suspicious activity and unauthorized privilege escalations
  • Implement network segmentation to isolate Coolify from critical infrastructure

🔍 How to Verify

Check if Vulnerable:

Check your Coolify version. If it's v4.0.0-beta.434 or earlier, you are vulnerable.

Check Version:

docker exec coolify cat /app/version.txt || check Coolify web interface settings

Verify Fix Applied:

After applying any future patch, verify that low-privilege users cannot use administrator invitation links.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected privilege escalation events
  • Multiple failed invitation attempts
  • Administrator login from unexpected user accounts

Network Indicators:

  • Unusual API calls from member accounts to administrative endpoints

SIEM Query:

source="coolify" AND (event="privilege_escalation" OR event="admin_login" user_role="member")

🔗 References

📤 Share & Export