← Voltar para CVEs
CVE-2025-64425
HIGH8.1
Descricao
Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In Coolify versions up to and including v4.0.0-beta.434, an attacker can initiate a password reset for a victim, and modify the host header of the request to a malicious value. The victim will receive a password reset email, with a link to the malicious host. If the victim clicks this link, their reset token is sent to the attacker's server, allowing the attacker to use it to change the victim's password and takeover their account. As of time of publication, it is unclear if a patch is available.
Detalhes CVE
Pontuacao CVSS v3.18.1
SeveridadeHIGH
Vetor CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Vetor de ataqueNETWORK
ComplexidadeLOW
Privilegios necessariosNONE
Interacao do usuarioREQUIRED
Publicado1/5/2026
Ultima modificacao1/12/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
coollabs:coolify
Fraquezas (CWE)
CWE-644
Referencias
https://drive.google.com/file/d/1I5sJHcpetJbKlwVS2usAD7qmgH37Y4rw/view?usp=drive_link(security-advisories@github.com)
https://github.com/coollabsio/coolify/security/advisories/GHSA-f737-2p93-g2cw(security-advisories@github.com)
https://github.com/coollabsio/coolify/security/advisories/GHSA-f737-2p93-g2cw(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.