CVE-2025-64419
Unknown Unknown - Not Provided
Command Injection in Coolify via Unsanitized docker-compose.yaml Parameters

Publication date: 2026-01-05

Last updated on: 2026-01-05

Assigner: GitHub, Inc.

Description
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.445, parameters coming from docker-compose.yaml are not sanitized when used in commands. If a victim user creates an application from an attacker repository (using build pack "docker compose"), the attacker can execute commands on the Coolify instance as root. Version 4.0.0-beta.445 fixes the issue.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-05
Last Modified
2026-01-05
Generated
2026-05-09
AI Q&A
2026-01-05
EPSS Evaluated
2026-05-07
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
coollabsio coolify to 4.0.0-beta.436 (exc)
coollabsio coolify to 4.0.0-beta.445 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-77 The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-64419 is a critical command injection vulnerability in Coolify versions prior to 4.0.0-beta.445. The issue occurs because parameters from the docker-compose.yaml file are not sanitized before being used in shell commands. An attacker can craft a malicious docker-compose.yaml in a repository, and if a victim user deploys an application from that repository using the "docker compose" build pack, the attacker can execute arbitrary commands on the Coolify host system with root privileges. This happens because the command execution function does not properly escape input, allowing injected commands to run on the host. The vulnerability enables attackers to run commands as root, potentially compromising the entire system. [2]


How can this vulnerability impact me? :

This vulnerability can have severe impacts including allowing attackers to execute arbitrary commands on the Coolify host system as root. This can lead to full system compromise, including unauthorized access to sensitive data, modification or deletion of files, disruption of services, and exfiltration of confidential information. The attack can be performed remotely without any privileges, requiring only that a victim deploys a malicious repository. The confidentiality, integrity, and availability of the affected system are all at high risk. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by inspecting deployments that use the 'docker compose' build pack with untrusted or attacker-controlled docker-compose.yaml files. Specifically, look for suspicious volume source parameters that include shell command injections, such as backticks or command substitutions. Since the vulnerability involves command injection via unsanitized parameters in docker-compose.yaml, monitoring for unusual docker exec commands or unexpected network connections (e.g., curl commands to external servers) from the Coolify host may help detect exploitation attempts. There are no explicit detection commands provided, but you can audit the docker-compose.yaml files used in deployments for suspicious entries, and monitor running containers and host processes for unexpected commands executed as root. [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include upgrading Coolify to version 4.0.0-beta.445 or later, where the vulnerability is fixed by automatically injecting the '-f' and '--env-file' flags into Docker Compose commands to ensure proper sanitization and configuration. Until the upgrade, avoid deploying applications from untrusted or attacker-controlled repositories, especially those using the 'docker compose' build pack. Additionally, review and restrict user permissions to prevent untrusted users from deploying arbitrary applications. Monitoring and restricting network access to the Coolify instance can also reduce risk. [1, 2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows attackers to execute arbitrary commands as root on the Coolify host, potentially leading to unauthorized access, data exfiltration, and system compromise. Such impacts can result in violations of data protection and security requirements mandated by standards like GDPR and HIPAA, which require safeguarding confidentiality, integrity, and availability of sensitive data and systems. Therefore, exploitation of this vulnerability could lead to non-compliance with these regulations due to the risk of data breaches and unauthorized system control. [2]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart