Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise

Related

Cybersecurity Leaders to Watch: Louisiana Healthcare

Louisiana’s healthcare sector depends on cybersecurity leaders who can...

Anthropic Unveils Claude Mythos to Find Critical Software Flaws Before Attackers Do

What happened Anthropic unveiled Claude Mythos Preview as the model...

Microsoft Commits $10 Billion to Expand AI and Cybersecurity Infrastructure in Japan

What happened Microsoft announced a $10 billion investment to expand...

Share

What happened

Coolify discloses 11 critical flaws enabling full server compromise in its self-hosting platform. The disclosed vulnerabilities include CVE-2025-66209, a CVSS 10.0 command injection flaw in the database backup functionality that allows authenticated users to bypass authentication and execute arbitrary commands, potentially leading to full server takeover. The set of flaws also encompasses authentication bypass and remote code execution (RCE) issues enabling attackers to escalate privileges and run arbitrary code on self-hosted Coolify instances. These vulnerabilities affect the open-source deployment of Coolify, with exploitation paths tied directly to its database and authentication mechanisms. 

Who is affected

Administrators and users of self-hosted Coolify instances are directly impacted due to the ability of authenticated attackers to execute code and gain elevated control over affected servers. 

Why CISOs should care

Critical flaws in widely used self-hosted platforms can lead to full infrastructure compromise, data exposure, and further lateral attacks, emphasizing the importance of vulnerability management and secure configuration for third-party tools. 

3 practical actions

  • Apply updates: Deploy Coolify security patches promptly across all self-hosted environments.
  • Restrict access: Limit authenticated access to Coolify management interfaces.
  • Review backups: Ensure backup mechanisms are secure and tested for integrity.Â