Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-59157 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: Coolify suffers from **OS Command Injection**. πŸ“‰ **Consequences**: Attackers can execute arbitrary system commands, leading to total server compromise, data theft, or service disruption.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: **CWE-78** (OS Command Injection). The flaw lies in **improper input sanitization** of the **Git Repository field**. Malicious payloads in this field bypass checks and execute as shell commands.

Q3Who is affected? (Versions/Components)

🏒 **Affected**: **Coolify** (by coollabsio). πŸ“… **Versions**: All versions **prior to 4.0.0-beta.420.7**. If you are running an older beta or stable release, you are vulnerable.

Q4What can hackers do? (Privileges/Data)

πŸ’€ **Attacker Capabilities**: With access, hackers gain **High** impact on Confidentiality, Integrity, and Availability.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Exploitation Threshold**: **Low**. CVSS indicates **AV:N** (Network), **AC:L** (Low Complexity), **PR:L** (Low Privileges required), **UI:N** (No User Interaction).…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ“¦ **Public Exploit**: **No**. The `pocs` array is empty. While the advisory is public, there is no confirmed public Proof-of-Concept (PoC) or widespread wild exploitation yet. Stay vigilant.

Q7How to self-check? (Features/Scanning)

πŸ” **Self-Check**: Scan for **Coolify** instances. Check if the **Git Repository** input field is present. Look for version numbers < **4.0.0-beta.420.7**.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Official Fix**: **Yes**. The vendor has issued a security advisory (GHSA-5cg9-38qj-8mc3). The fix is included in version **4.0.0-beta.420.7** and later. Update immediately.

Q9What if no patch? (Workaround)

🚧 **No Patch Workaround**: If you cannot update, **strictly sanitize** the Git Repository input field. Implement allow-lists for valid repository URLs.…

Q10Is it urgent? (Priority Suggestion)

⚑ **Urgency**: **HIGH**. CVSS Vector shows **H** (High) impact across all categories. As an open-source PaaS alternative, trust is key. Patch immediately to prevent potential remote code execution by low-privilege users.