CVE-2025-66210

8.8 HIGH

📋 TL;DR

CVE-2025-66210 is an authenticated command injection vulnerability in Coolify's Database Import functionality that allows users with application/service management permissions to execute arbitrary commands as root on managed servers. This affects all Coolify instances prior to version 4.0.0-beta.451 where database names are passed unsanitized to shell commands.

💻 Affected Systems

Products:
  • Coolify
Versions: All versions prior to 4.0.0-beta.451
Operating Systems: Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with application/service management permissions. Affects all deployments where Database Import functionality is accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full root-level remote code execution on all managed servers, allowing complete system compromise, data exfiltration, and lateral movement across infrastructure.

🟠

Likely Case

Privileged authenticated users can execute arbitrary commands on managed servers, potentially compromising databases, applications, and underlying infrastructure.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to specific managed servers accessible to the compromised user account.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is straightforward once credentials are obtained. Public proof-of-concept exists in GitHub repository.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.0.0-beta.451

Vendor Advisory: https://github.com/coollabsio/coolify/security/advisories/GHSA-q33h-22xm-4cgh

Restart Required: Yes

Instructions:

1. Backup your Coolify configuration and data. 2. Update to version 4.0.0-beta.451 or later using: docker pull coollabsio/coolify:latest. 3. Restart the Coolify container. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Disable Database Import Functionality

linux

Temporarily disable or restrict access to the Database Import feature in Coolify until patching is possible.

Restrict User Permissions

all

Review and reduce application/service management permissions for users who don't absolutely require them.

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Coolify instances from critical infrastructure
  • Enable detailed logging and monitoring for all database import operations and shell command execution

🔍 How to Verify

Check if Vulnerable:

Check if your Coolify version is below 4.0.0-beta.451. Review user permissions to identify accounts with application/service management access.

Check Version:

docker exec coolify cat /app/package.json | grep version

Verify Fix Applied:

Confirm version is 4.0.0-beta.451 or higher and test that database import functionality properly sanitizes input.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database import operations
  • Shell command execution from Coolify process
  • Database names containing shell metacharacters

Network Indicators:

  • Unexpected outbound connections from Coolify server
  • SSH or remote access attempts from Coolify to managed servers

SIEM Query:

source="coolify" AND (event="database_import" OR command_execution) | search suspicious_patterns

🔗 References

📤 Share & Export