Goal Reached Thanks to every supporter β€” we hit 100%!

Goal: 1000 CNY Β· Raised: 1000 CNY

100.0%

CVE-2025-66209 β€” AI Deep Analysis Summary

CVSS 10.0 Β· Critical

Q1What is this vulnerability? (Essence + Consequences)

🚨 **Essence**: OS Command Injection in Coolify's Database Backup feature. πŸ“‰ **Consequences**: Attackers can execute arbitrary system commands via uncleaned database names.…

Q2Root Cause? (CWE/Flaw)

πŸ›‘οΈ **Root Cause**: CWE-78 (OS Command Injection). πŸ› **Flaw**: The application fails to sanitize user-supplied database names before passing them to system shell commands.…

Q3Who is affected? (Versions/Components)

πŸ“¦ **Product**: Coolify (Open-source Heroku/Netlify/Vercel alternative). 🏒 **Vendor**: coollabsio. πŸ“… **Affected Versions**: Pre-4.0.0-beta.451. βœ… **Safe Version**: 4.0.0-beta.451 and later.

Q4What can hackers do? (Privileges/Data)

πŸ‘‘ **Privileges**: High. The vulnerability allows execution with the privileges of the Coolify service user.…

Q5Is exploitation threshold high? (Auth/Config)

πŸ”‘ **Auth Required**: Yes. CVSS vector indicates PR:L (Privileges Required: Low). 🚫 **External Access**: Not directly exploitable from the internet without valid credentials.…

Q6Is there a public Exp? (PoC/Wild Exploitation)

πŸ”“ **Public Exploit**: Yes. A public security advisory and PoC are available on GitHub (0xrakan). πŸ“’ **Status**: Active disclosure. ⚠️ **Risk**: Low-hanging fruit for attackers who have gained initial access.

Q7How to self-check? (Features/Scanning)

πŸ” **Check**: Look for Coolify instances running version < 4.0.0-beta.451. πŸ› οΈ **Feature**: Check if the 'Database Backup' function is enabled and accessible.…

Q8Is it fixed officially? (Patch/Mitigation)

βœ… **Fixed**: Yes. Official patch released in **v4.0.0-beta.451**. πŸ“₯ **Action**: Upgrade Coolify immediately. πŸ”— **Ref**: See GitHub Security Advisory GHSA-vm5p-43qh-7pmq for details.

Q9What if no patch? (Workaround)

🚧 **Workaround**: If upgrading is impossible, restrict access to the Database Backup feature. πŸ”’ **Access Control**: Ensure only trusted, authenticated users can trigger backups.…

Q10Is it urgent? (Priority Suggestion)

πŸ”₯ **Priority**: HIGH. πŸ“ˆ **CVSS**: 9.8 (Critical). πŸš€ **Urgency**: Patch immediately upon upgrade. Even though auth is required, the impact is severe (S:C, C:H, I:H, A:H). Don't wait!