image.png

You’ll want to run this Docker container locally:

git clone <https://github.com/androidteacher/CVE-2025-64424-Coolify-.git>
cd CVE-2025-64424-Coolify-/lab
docker compose up --build -d

Point your web browser at the login:

<http://localhost:10005>

What is Coolify?

Simple Use Cases

What is the Vulnerability?

An "injection" occurs when an application accidentally treats data or input (such as a URL) as a command to execute. Because Coolify runs with elevated system permissions to manage Docker containers, anyone who can trigger this flaw can execute commands as the root user.

How the Attack Works (The RCE Flow)

  1. Login: An attacker logs into the Coolify dashboard. They only need "Member" (low-privileged) access—they don't need to be an administrator.
  2. Create Resource: The attacker creates a new "Application" or "Resource" that requires a Git repository.
  3. The Payload: Instead of a normal URL, they enter a "malicious" string into the Repository URL
    1. We’ll use a semi-colon ; to inject commands
  4. Execution: Coolify will execute whatever we drop after the semi-colon ;

The Vulnerable Source Code