Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得通读整篇文章,抓住主要信息。 文章主要讲的是Coolify这个开源平台发现了多个严重漏洞。这些漏洞包括命令注入和信息泄露,CVSS评分都很高,有些甚至达到了满分10分。漏洞影响了数据库备份、导入、配置等功能,可能导致服务器被完全控制。 接下来,文章提到这些漏洞已经修复,并给出了受影响的版本范围。另外,Censys的数据指出有超过5万的Coolify实例暴露在互联网上,主要分布在德国、美国等地。虽然目前没有被利用的迹象,但建议用户尽快修复。 现在我需要把这些信息浓缩到100字以内。要突出关键点:多个严重漏洞、影响范围、CVSS评分、修复情况以及暴露实例的数量和分布。 可能的结构是:先点出发现漏洞的数量和类型,然后说明影响和风险,接着提到修复情况和暴露实例的数量及分布,最后强调及时修复的重要性。 现在试着组织语言: “研究人员披露了Coolify平台的多个严重漏洞(CVSS评分9.4-10.0),涉及命令注入和信息泄露。这些漏洞可能导致身份验证绕过、远程代码执行及服务器完全控制。部分已修复(版本>=4.0.0-beta.451等),但部分修复状态不明。约52,890个Coolify实例暴露于互联网(德国最多)。建议用户尽快应用补丁。” 这样大约在100字左右,涵盖了主要信息。 </think> 研究人员披露了Coolify平台的多个严重漏洞(CVSS评分9.4-10.0),涉及命令注入和信息泄露。这些漏洞可能导致身份验证绕过、远程代码执行及服务器完全控制。部分已修复(版本>=4.0.0-beta.451等),但部分修复状态不明。约52,890个Coolify实例暴露于互联网(德国最多)。建议用户尽快应用补丁。 2026-1-8 09:53:0 Author: thehackernews.com(查看原文) 阅读量:4 收藏

Vulnerability / Container Security

Cybersecurity researchers have disclosed details of multiple critical-severity security flaws affecting Coolify, an open-source, self-hosting platform, that could result in authentication bypass and remote code execution.

The list of vulnerabilities is as follows -

  • CVE-2025-66209 (CVSS score: 10.0) - A command injection vulnerability in the database backup functionality allows any authenticated user with database backup permissions to execute arbitrary commands on the host server, resulting in container escape and full server compromise
  • CVE-2025-66210 (CVSS score: 10.0) - An authenticated command injection vulnerability in the database import functionality allows attackers to execute arbitrary commands on managed servers, leading to full infrastructure compromise
  • CVE-2025-66211 (CVSS score: 10.0) - A command injection vulnerability in the PostgreSQL init script management allows authenticated users with database permissions to execute arbitrary commands as root on the server
  • CVE-2025-66212 (CVSS score: 10.0) - An authenticated command injection vulnerability in the Dynamic Proxy Configuration functionality allows users with server management permissions to execute arbitrary commands as root on managed servers
  • CVE-2025-66213 (CVSS score: 10.0) - An authenticated command injection vulnerability in the File Storage Directory Mount functionality allows users with application/service management permissions to execute arbitrary commands as root on managed servers
  • CVE-2025-64419 (CVSS score: 9.7) - A command injection vulnerability via docker-compose.yaml that enables attackers to execute arbitrary system commands as root on the Coolify instance
  • CVE-2025-64420 (CVSS score: 10.0) - An information disclosure vulnerability that allows low-privileged users to view the private key of the root user on the Coolify instance, allowing them to gain unauthorized access to the server via SSH and authenticate as the root user using the key
  • CVE-2025-64424 (CVSS score: 9.4) - A command injection vulnerability was found in the git source input fields of a resource, allowing a low-privileged user (member) to execute system commands as root on the Coolify instance
  • CVE-2025-59156 (CVSS score: 9.4) - An operating system command injection vulnerability that allows a low-privileged user to inject arbitrary Docker Compose directives and achieve root-level command execution on the underlying host
  • CVE-2025-59157 (CVSS score: 10.0) - An operating system command injection vulnerability that allows a regular user to inject arbitrary shell commands that execute on the underlying server by using the Git Repository field during deployment
  • CVE-2025-59158 (CVSS score: 9.4) - An improper encoding or escaping of the data that allows an authenticated user with low privileges to conduct a stored cross-site scripting (XSS) attack during project creation that's automatically executed in the browser context when an administrator later attempts to delete the project or its associated resource
Cybersecurity

The following versions are impacted by the shortcomings -

  • CVE-2025-66209, CVE-2025-66210, CVE-2025-66211 - <= 4.0.0-beta.448 (Fixed in >= 4.0.0-beta.451)
  • CVE-2025-66212, CVE-2025-66213 - <= 4.0.0-beta.450 (Fixed in >= 4.0.0-beta.451)
  • CVE-2025-64419 - < 4.0.0-beta.436 (Fixed in >= 4.0.0-beta.445)
  • CVE-2025-64420, CVE-2025-64424 - <= 4.0.0-beta.434 (Fix status unclear)
  • CVE-2025-59156, CVE-2025-59157, CVE-2025-59158 - <= 4.0.0-beta.420.6 (Fixed in 4.0.0-beta.420.7)
Source: Censys

According to data from attack surface management platform Censys, there are about 52,890 exposed Coolify hosts as of January 8, 2026, with most of them located in Germany (15,000), the U.S. (9,800), France (8,000), Brazil (4,200), and Finland (3,400)

While there are no indications that any of the flaws have been exploited in the wild, it's essential that users move quickly to apply the fixes as soon as possible in light of their severity.

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/01/coolify-discloses-11-critical-flaws.html
如有侵权请联系:admin#unsafe.sh