Coolify versions prior to v4.0.0-beta.420.6 are vulnerable to a remote code execution vulnerability in the application deployment workflow. The platform allows authenticated users, with low-level member privileges, to inject arbitrary Docker Compose directives during project creation. By crafting a malicious service definition that mounts the host root filesystem, an attacker can gain full root access to the underlying server.
Solution:
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
Link | Tags |
---|---|
https://github.com/coollabsio/coolify/releases/tag/v4.0.0-beta.420.7 | patch vendor advisory |
https://coolify.io/ | product |
https://github.com/Eyodav/CVE-2025-34159 | technical description exploit |