Cyber Posture

CVE-2025-22612

CriticalPublic PoC

Published: 24 January 2025

Published
24 January 2025
Modified
19 September 2025
KEV Added
Patch
CVSS Score 10.0 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0052 66.9th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.374, the missing authorization allows an authenticated user to retrieve any existing private keys on a coolify instance in plain text. If the server configuration of IP / domain, port (most likely 22) and user (root) matches with the victim's server configuration, then the attacker can execute arbitrary commands on the remote server. Version 4.0.0-beta.374 fixes the issue.

Security Summary

CVE-2025-22612 is a critical authorization bypass vulnerability (CWE-862) combined with sensitive information exposure (CWE-200) in Coolify, an open-source, self-hostable tool for managing servers, applications, and databases. In versions prior to 4.0.0-beta.374, the flaw allows authenticated users to retrieve any existing private keys stored on a Coolify instance in plain text. The vulnerability has a CVSS v3.1 base score of 10.0 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H), indicating maximum severity due to its network accessibility, low complexity, and potential for complete confidentiality, integrity, and availability impacts.

An authenticated attacker with access to the Coolify instance can exploit this by directly fetching private keys without proper authorization checks. If the stolen private key corresponds to a victim's server configuration—matching the IP or domain, port (typically 22 for SSH), and user (often root)—the attacker can use it to authenticate and execute arbitrary commands on the remote server, potentially leading to full remote code execution and server compromise.

The official advisory on GitHub (GHSA-wg8x-cgq4-vjxj) confirms that updating to Coolify version 4.0.0-beta.374 resolves the issue by implementing the necessary authorization controls to prevent unauthorized access to private keys. Security practitioners should prioritize patching affected instances and review access controls for any authenticated users on Coolify deployments.

Details

CWE(s)
CWE-200CWE-862

Affected Products

coollabs
coolify
4.0.0 · ≤ 4.0.0

References