Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances
Overview
Researchers have identified 11 critical security vulnerabilities in Coolify, an open-source platform for self-hosting applications. These flaws could allow attackers to bypass authentication and execute arbitrary code on affected servers. Notably, one of the vulnerabilities, CVE-2025-66209, has a maximum severity score of 10.0, indicating the potential for severe exploitation if left unaddressed. Users of Coolify need to take immediate action to secure their installations, as these vulnerabilities could lead to full server compromise. This incident underscores the importance of regularly updating and monitoring open-source software to mitigate risks.
Key Takeaways
- Affected Systems: Coolify (all self-hosted instances), CVE-2025-66209 (Command Injection vulnerability)
- Action Required: Users should update their Coolify installations to the latest version as soon as patches are available.
- Timeline: Newly disclosed
Original Article Summary
Cybersecurity researchers have disclosed details of multiple critical-severity security flaws affecting Coolify, an open-source, self-hosting platform, that could result in authentication bypass and remote code execution. The list of vulnerabilities is as follows - CVE-2025-66209 (CVSS score: 10.0) - A command injection vulnerability in the database backup functionality allows any authenticated
Impact
Coolify (all self-hosted instances), CVE-2025-66209 (Command Injection vulnerability)
Exploitation Status
No active exploitation has been reported at this time. However, organizations should still apply patches promptly as proof-of-concept code may exist.
Timeline
Newly disclosed
Remediation
Users should update their Coolify installations to the latest version as soon as patches are available. Additionally, it is advisable to review server configurations and access controls to limit exposure to these vulnerabilities.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to CVE, Vulnerability, Critical.