By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances
Computing

Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances

News Room
Last updated: 2026/01/10 at 5:24 AM
News Room Published 10 January 2026
Share
Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances
SHARE

Jan 08, 2026Ravie LakshmananVulnerability / Container Security

Cybersecurity researchers have disclosed details of multiple critical-severity security flaws affecting Coolify, an open-source, self-hosting platform, that could result in authentication bypass and remote code execution.

The list of vulnerabilities is as follows –

  • CVE-2025-66209 (CVSS score: 10.0) – A command injection vulnerability in the database backup functionality allows any authenticated user with database backup permissions to execute arbitrary commands on the host server, resulting in container escape and full server compromise
  • CVE-2025-66210 (CVSS score: 10.0) – An authenticated command injection vulnerability in the database import functionality allows attackers to execute arbitrary commands on managed servers, leading to full infrastructure compromise
  • CVE-2025-66211 (CVSS score: 10.0) – A command injection vulnerability in the PostgreSQL init script management allows authenticated users with database permissions to execute arbitrary commands as root on the server
  • CVE-2025-66212 (CVSS score: 10.0) – An authenticated command injection vulnerability in the Dynamic Proxy Configuration functionality allows users with server management permissions to execute arbitrary commands as root on managed servers
  • CVE-2025-66213 (CVSS score: 10.0) – An authenticated command injection vulnerability in the File Storage Directory Mount functionality allows users with application/service management permissions to execute arbitrary commands as root on managed servers
  • CVE-2025-64419 (CVSS score: 9.7) – A command injection vulnerability via docker-compose.yaml that enables attackers to execute arbitrary system commands as root on the Coolify instance
  • CVE-2025-64420 (CVSS score: 10.0) – An information disclosure vulnerability that allows low-privileged users to view the private key of the root user on the Coolify instance, allowing them to gain unauthorized access to the server via SSH and authenticate as the root user using the key
  • CVE-2025-64424 (CVSS score: 9.4) – A command injection vulnerability was found in the git source input fields of a resource, allowing a low-privileged user (member) to execute system commands as root on the Coolify instance
  • CVE-2025-59156 (CVSS score: 9.4) – An operating system command injection vulnerability that allows a low-privileged user to inject arbitrary Docker Compose directives and achieve root-level command execution on the underlying host
  • CVE-2025-59157 (CVSS score: 10.0) – An operating system command injection vulnerability that allows a regular user to inject arbitrary shell commands that execute on the underlying server by using the Git Repository field during deployment
  • CVE-2025-59158 (CVSS score: 9.4) – An improper encoding or escaping of the data that allows an authenticated user with low privileges to conduct a stored cross-site scripting (XSS) attack during project creation that’s automatically executed in the browser context when an administrator later attempts to delete the project or its associated resource
Cybersecurity

The following versions are impacted by the shortcomings –

  • CVE-2025-66209, CVE-2025-66210, CVE-2025-66211 – <= 4.0.0-beta.448 (Fixed in >= 4.0.0-beta.451)
  • CVE-2025-66212, CVE-2025-66213 – <= 4.0.0-beta.450 (Fixed in >= 4.0.0-beta.451)
  • CVE-2025-64419 – < 4.0.0-beta.436 (Fixed in >= 4.0.0-beta.445)
  • CVE-2025-64420, CVE-2025-64424 – <= 4.0.0-beta.434 (Fix status unclear)
  • CVE-2025-59156, CVE-2025-59157, CVE-2025-59158 – <= 4.0.0-beta.420.6 (Fixed in 4.0.0-beta.420.7)
Source: Censys

According to data from attack surface management platform Censys, there are about 52,890 exposed Coolify hosts as of January 8, 2026, with most of them located in Germany (15,000), the U.S. (9,800), France (8,000), Brazil (4,200), and Finland (3,400)

While there are no indications that any of the flaws have been exploited in the wild, it’s essential that users move quickly to apply the fixes as soon as possible in light of their severity.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Industry, Primal, Amish: What’s New to Watch on HBO Max the Week of January 9, 2026 Industry, Primal, Amish: What’s New to Watch on HBO Max the Week of January 9, 2026
Next Article Stronger laws force tech firms to stop cyberflashing – UKTN Stronger laws force tech firms to stop cyberflashing – UKTN
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Amazon Prime Vs. Costco Gold Star: Which Membership Is Better For Tech? – BGR
Amazon Prime Vs. Costco Gold Star: Which Membership Is Better For Tech? – BGR
News
Epicor enhances frontline worker solutions with Acadia acquisition
Epicor enhances frontline worker solutions with Acadia acquisition
News
Embodied AI startup TARS completes 2 million angel+ funding round: report · TechNode
Embodied AI startup TARS completes $122 million angel+ funding round: report · TechNode
Computing
Apple might have dissected this Android foldable to recreate its crease-less screen
Apple might have dissected this Android foldable to recreate its crease-less screen
News

You Might also Like

Embodied AI startup TARS completes 2 million angel+ funding round: report · TechNode
Computing

Embodied AI startup TARS completes $122 million angel+ funding round: report · TechNode

1 Min Read
ROMOSS suspends production for six months · TechNode
Computing

ROMOSS suspends production for six months · TechNode

4 Min Read
Manus trims China team, relocates core staff to Singapore headquarters · TechNode
Computing

Manus trims China team, relocates core staff to Singapore headquarters · TechNode

3 Min Read
New Shanghai policy may accelerate foreign game approvals in China · TechNode
Computing

New Shanghai policy may accelerate foreign game approvals in China · TechNode

1 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?