Vulnerability Description
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to attach any existing private key on a coolify instance to his own server. If the server configuration of IP / domain, port (most likely 22) and user (root) matches with the victim's server configuration, then the attacker can use the `Terminal` feature and execute arbitrary commands on the victim's server. Version 4.0.0-beta.361 fixes the issue.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Coollabs | Coolify | < 4.0.0 |
Related Weaknesses (CWE)
References
- https://github.com/coollabsio/coolify/security/advisories/GHSA-3w2c-jfr2-9pg9ExploitVendor Advisory
FAQ
What is CVE-2025-22609?
CVE-2025-22609 is a vulnerability with a CVSS score of 10.0 (CRITICAL). Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to attach a...
How severe is CVE-2025-22609?
CVE-2025-22609 has been rated CRITICAL with a CVSS base score of 10.0/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2025-22609?
Check the references section above for vendor advisories and patch information. Affected products include: Coollabs Coolify.