CVE-2025-64425

8.1 HIGH

📋 TL;DR

This vulnerability in Coolify allows attackers to hijack password reset emails by manipulating the host header. When victims click malicious reset links, their tokens are sent to attacker-controlled servers, enabling account takeover. All Coolify instances up to v4.0.0-beta.434 are affected.

💻 Affected Systems

Products:
  • Coolify
Versions: All versions up to and including v4.0.0-beta.434
Operating Systems: All platforms running Coolify
Default Config Vulnerable: ⚠️ Yes
Notes: All Coolify deployments using the built-in password reset functionality are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover of any user, including administrators, leading to full system compromise and data exposure.

🟠

Likely Case

Attacker gains unauthorized access to user accounts, potentially escalating privileges within the Coolify environment.

🟢

If Mitigated

With proper email validation and host header verification, impact is limited to failed password reset attempts.

🌐 Internet-Facing: HIGH - Internet-facing instances are directly exploitable by external attackers.
🏢 Internal Only: MEDIUM - Internal instances require attacker access to the network but remain vulnerable.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only HTTP request manipulation and a malicious server to capture tokens.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://github.com/coollabsio/coolify/security/advisories/GHSA-f737-2p93-g2cw

Restart Required: Yes

Instructions:

Monitor the Coolify GitHub repository for security updates. When a patch is released, update to the fixed version and restart the service.

🔧 Temporary Workarounds

Disable Password Reset

all

Temporarily disable the password reset functionality to prevent exploitation.

Modify Coolify configuration to disable password reset feature

Host Header Validation

all

Implement reverse proxy or WAF rules to validate and sanitize host headers.

Configure web server or WAF to reject requests with unexpected host headers

🧯 If You Can't Patch

  • Implement network segmentation to isolate Coolify instances from untrusted networks
  • Enable multi-factor authentication for all user accounts to reduce impact of password compromise

🔍 How to Verify

Check if Vulnerable:

Check if Coolify version is ≤ v4.0.0-beta.434 and password reset functionality is enabled.

Check Version:

Check Coolify web interface or configuration files for version information

Verify Fix Applied:

After applying any fix, test password reset functionality with manipulated host headers to ensure tokens are not sent to unauthorized domains.

📡 Detection & Monitoring

Log Indicators:

  • Unusual password reset requests, requests with manipulated host headers, failed login attempts after password resets

Network Indicators:

  • Outbound connections to suspicious domains following password reset requests

SIEM Query:

Search for HTTP requests with host headers containing unusual domains or IP addresses in web server logs

🔗 References

📤 Share & Export