← Back to CVEs
CVE-2025-34161
HIGH8.8
Description
Coolify versions prior to v4.0.0-beta.420.7 are vulnerable to a remote code execution vulnerability in the project deployment workflow. The platform allows authenticated users, with low-level member privileges, to inject arbitrary shell commands via the Git Repository field during project creation. By submitting a crafted repository string containing command injection syntax, an attacker can execute arbitrary commands on the underlying host system, resulting in full server compromise.
CVE Details
CVSS v3.1 Score8.8
SeverityHIGH
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredLOW
User InteractionNONE
Published8/27/2025
Last Modified9/19/2025
Sourcenvd
Honeypot Sightings0
Affected Products
coollabs:coolify
Weaknesses (CWE)
CWE-20CWE-78CWE-78
References
https://coolify.io/(disclosure@vulncheck.com)
https://github.com/Eyodav/CVE-2025-34161(disclosure@vulncheck.com)
https://github.com/coollabsio/coolify/releases/tag/v4.0.0-beta.420.7(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.