Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances

Coolify Discloses 11 Critical Flaws Enabling Full Server Compromise on Self-Hosted Instances

Posted on January 8, 2026January 8, 2026 By CWS

Jan 08, 2026Ravie LakshmananVulnerability / Container Safety
Cybersecurity researchers have disclosed particulars of a number of critical-severity safety flaws affecting Coolify, an open-source, self-hosting platform, that might lead to authentication bypass and distant code execution.
The listing of vulnerabilities is as follows –

CVE-2025-66209 (CVSS rating: 10.0) – A command injection vulnerability within the database backup performance permits any authenticated person with database backup permissions to execute arbitrary instructions on the host server, leading to container escape and full server compromise
CVE-2025-66210 (CVSS rating: 10.0) – An authenticated command injection vulnerability within the database import performance permits attackers to execute arbitrary instructions on managed servers, resulting in full infrastructure compromise
CVE-2025-66211 (CVSS rating: 10.0) – A command injection vulnerability within the PostgreSQL init script administration permits authenticated customers with database permissions to execute arbitrary instructions as root on the server
CVE-2025-66212 (CVSS rating: 10.0) – An authenticated command injection vulnerability within the Dynamic Proxy Configuration performance permits customers with server administration permissions to execute arbitrary instructions as root on managed servers
CVE-2025-66213 (CVSS rating: 10.0) – An authenticated command injection vulnerability within the File Storage Listing Mount performance permits customers with utility/service administration permissions to execute arbitrary instructions as root on managed servers
CVE-2025-64419 (CVSS rating: 9.7) – A command injection vulnerability through docker-compose.yaml that permits attackers to execute arbitrary system instructions as root on the Coolify occasion
CVE-2025-64420 (CVSS rating: 10.0) – An data disclosure vulnerability that enables low-privileged customers to view the non-public key of the basis person on the Coolify occasion, permitting them to achieve unauthorized entry to the server through SSH and authenticate as the basis person utilizing the important thing
CVE-2025-64424 (CVSS rating: 9.4) – A command injection vulnerability was discovered within the git supply enter fields of a useful resource, permitting a low-privileged person (member) to execute system instructions as root on the Coolify occasion
CVE-2025-59156 (CVSS rating: 9.4) – An working system command injection vulnerability that enables a low-privileged person to inject arbitrary Docker Compose directives and obtain root-level command execution on the underlying host
CVE-2025-59157 (CVSS rating: 10.0) – An working system command injection vulnerability that enables an everyday person to inject arbitrary shell instructions that execute on the underlying server by utilizing the Git Repository discipline throughout deployment
CVE-2025-59158 (CVSS rating: 9.4) – An improper encoding or escaping of the info that enables an authenticated person with low privileges to conduct a saved cross-site scripting (XSS) assault throughout undertaking creation that is routinely executed within the browser context when an administrator later makes an attempt to delete the undertaking or its related useful resource

The next variations are impacted by the shortcomings –

CVE-2025-66209, CVE-2025-66210, CVE-2025-66211 – <= 4.0.0-beta.448 (Mounted in >= 4.0.0-beta.451)
CVE-2025-66212, CVE-2025-66213 – <= 4.0.0-beta.450 (Mounted in >= 4.0.0-beta.451)
CVE-2025-64419 – < 4.0.0-beta.436 (Mounted in >= 4.0.0-beta.445)
CVE-2025-64420, CVE-2025-64424 – <= 4.0.0-beta.434 (Repair standing unclear)
CVE-2025-59156, CVE-2025-59157, CVE-2025-59158 – <= 4.0.0-beta.420.6 (Mounted in 4.0.0-beta.420.7)

Supply: Censys
Based on knowledge from assault floor administration platform Censys, there are about 52,890 uncovered Coolify hosts as of January 8, 2026, with most of them situated in Germany (15,000), the U.S. (9,800), France (8,000), Brazil (4,200), and Finland (3,400)
Whereas there aren’t any indications that any of the issues have been exploited within the wild, it is important that customers transfer rapidly to use the fixes as quickly as potential in mild of their severity.

The Hacker News Tags:Compromise, Coolify, Critical, Discloses, Enabling, Flaws, Full, Instances, SelfHosted, Server

Post navigation

Previous Post: GitLab Patches Multiple Vulnerabilities that Enables Arbitrary Code Execution
Next Post: Researchers Uncover NodeCordRAT Hidden in npm Bitcoin-Themed Packages

Related Posts

Open Source Web Application Firewall with Zero-Day Detection and Bot Protection Open Source Web Application Firewall with Zero-Day Detection and Bot Protection The Hacker News
A Browser Extension Risk Guide After the ShadyPanda Campaign A Browser Extension Risk Guide After the ShadyPanda Campaign The Hacker News
New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits New Android Malware Wave Hits Banking via NFC Relay Fraud, Call Hijacking, and Root Exploits The Hacker News
CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability CISA Warns of Actively Exploited Critical Oracle Identity Manager Zero-Day Vulnerability The Hacker News
OpenSSL Vulnerabilities and Emerging Cyber Threats OpenSSL Vulnerabilities and Emerging Cyber Threats The Hacker News
Exploring NDR Systems: A Hands-On Experience Exploring NDR Systems: A Hands-On Experience The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark