Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.374, the missing authorization allows an authenticated user to retrieve any existing private keys on a coolify instance in plain text. If the server configuration of IP / domain, port (most likely 22) and user (root) matches with the victim's server configuration, then the attacker can execute arbitrary commands on the remote server. Version 4.0.0-beta.374 fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/coollabsio/coolify/security/advisories/GHSA-wg8x-cgq4-vjxj | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2025-01-24 17:15
Updated : 2025-09-19 15:27
NVD link : CVE-2025-22612
Mitre link : CVE-2025-22612
CVE.ORG link : CVE-2025-22612
JSON object : View
Products Affected
coollabs
- coolify
