Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise

Related

CISOs to Watch in Canadian Manufacturing

Canada’s manufacturing sector spans aerospace, automotive, food production, forestry,...

CISOs to Watch in Canadian Mining & Natural Resources

Canada’s mining and natural resources sector is a global...

CISOs to Watch in Canadian Energy & Utilities

Canada’s energy and utilities sector underpins national resilience, economic...

VoiceRun’s $5.5M Seed Round Signals Enterprise Voice AI Maturation

What happened VoiceRun, a Cambridge, Massachusetts–based startup offering a code‑first...

Pax8 Email Error Exposes MSP Partner Licensing and Customer Lists

What happened A Pax8 email error exposes MSP partner licensing...

Share

What happened

Coolify discloses 11 critical flaws enabling full server compromise in its self-hosting platform. The disclosed vulnerabilities include CVE-2025-66209, a CVSS 10.0 command injection flaw in the database backup functionality that allows authenticated users to bypass authentication and execute arbitrary commands, potentially leading to full server takeover. The set of flaws also encompasses authentication bypass and remote code execution (RCE) issues enabling attackers to escalate privileges and run arbitrary code on self-hosted Coolify instances. These vulnerabilities affect the open-source deployment of Coolify, with exploitation paths tied directly to its database and authentication mechanisms. 

Who is affected

Administrators and users of self-hosted Coolify instances are directly impacted due to the ability of authenticated attackers to execute code and gain elevated control over affected servers. 

Why CISOs should care

Critical flaws in widely used self-hosted platforms can lead to full infrastructure compromise, data exposure, and further lateral attacks, emphasizing the importance of vulnerability management and secure configuration for third-party tools. 

3 practical actions

  • Apply updates: Deploy Coolify security patches promptly across all self-hosted environments.
  • Restrict access: Limit authenticated access to Coolify management interfaces.
  • Review backups: Ensure backup mechanisms are secure and tested for integrity.Â