INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global malware Financial Services, Cryptocurrency CRITICAL 49m Global general Financial Services and E-commerce MEDIUM 52m Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 49m Global general Financial Services and E-commerce MEDIUM 52m Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 49m Global general Financial Services and E-commerce MEDIUM 52m Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 1h Global phishing Technology and Consumer Services HIGH 1h Global data_breach Multiple sectors HIGH 2h Global vulnerability Government and Critical Infrastructure CRITICAL 2h Global vulnerability Multiple sectors CRITICAL 2h Global apt Financial Services, Government HIGH 2h Global insider Cross-sector CRITICAL 3h
Vulnerabilities

CVE-2025-64421

High ⚡ Exploit Available
Coolify Privilege Escalation via Improper Authorization (CVE-2025-64421)
CWE-863 — Weakness Type
Published: Jan 5, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
8.0
🔗 NVD Official
📄 Description (English)

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In Coolify versions up to and including v4.0.0-beta.434, a low privileged user (member) can invite a high privileged user. At first, the application will throw an error, but if the attacker clicks the invite button a second time, it actually works. This way, a low privileged user can invite themselves as an administrator to the Coolify instance. After the high privileged user is invited, the attacker can initiate a password reset and log in with the new admin. As of time of publication, it is unclear if a patch is available.

🤖 AI Executive Summary

Coolify versions up to v4.0.0-beta.434 contain a critical privilege escalation vulnerability (CWE-863) allowing low-privileged users to invite themselves as administrators through a double-click exploit. Attackers can then reset the admin password and gain full control of the Coolify instance managing servers, applications, and databases. No patch is currently available.

📄 Description (Arabic)

تتيح هذه الثغرة الأمنية في نظام Coolify لإدارة الخوادم والتطبيقات للمستخدمين ذوي الصلاحيات المحدودة (الأعضاء) تصعيد صلاحياتهم إلى مستوى المسؤول من خلال استغلال خلل في آلية التفويض. عند النقر على زر الدعوة مرتين، يتجاوز النظام فحوصات الصلاحيات ويسمح بدعوة المستخدم نفسه كمسؤول. بعد ذلك، يمكن للمهاجم بدء عملية إعادة تعيين كلمة المرور والوصول الكامل إلى النظام. تؤثر الثغرة على جميع الإصدارات حتى v4.0.0-beta.434 مع عدم توفر تصحيح أمني حتى الآن.

🤖 ملخص تنفيذي (AI)

تحتوي إصدارات Coolify حتى v4.0.0-beta.434 على ثغرة حرجة لتصعيد الصلاحيات (CWE-863) تسمح للمستخدمين ذوي الصلاحيات المنخفضة بدعوة أنفسهم كمسؤولين من خلال استغلال النقر المزدوج. يمكن للمهاجمين بعد ذلك إعادة تعيين كلمة مرور المسؤول والحصول على التحكم الكامل في نظام Coolify الذي يدير الخوادم والتطبيقات وقواعد البيانات. لا يوجد تصحيح متاح حالياً.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 07:28
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations using Coolify for infrastructure management face critical risk of complete system compromise, as attackers with basic user access can escalate to full administrative control over servers, applications, and databases. This directly violates access control requirements under NCA ECC and SAMA CSF frameworks, potentially exposing sensitive data and critical infrastructure to unauthorized access.
🏢 Affected Saudi Sectors
تقنية المعلومات والاتصالات الخدمات المالية والمصرفية الخدمات الحكومية الرعاية الصحية التعليم
⚖️ Saudi Risk Score (AI)
9.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately audit all Coolify instances to identify unauthorized administrative accounts and review user invitation logs for suspicious activity patterns involving repeated invitation attempts.
2. Implement compensating controls by restricting network access to Coolify management interfaces through firewall rules, VPN requirements, and multi-factor authentication for all administrative functions until a patch becomes available.
3. Consider migrating to alternative infrastructure management solutions or implementing manual approval workflows for all user role changes and invitations as a temporary mitigation measure.
🔧 خطوات المعالجة (العربية)
1. إجراء مراجعة فورية لجميع نسخ Coolify لتحديد حسابات المسؤولين غير المصرح بها ومراجعة سجلات دعوات المستخدمين للكشف عن أنماط نشاط مشبوهة تتضمن محاولات دعوة متكررة.
2. تطبيق ضوابط تعويضية من خلال تقييد الوصول الشبكي إلى واجهات إدارة Coolify عبر قواعد الجدار الناري ومتطلبات الشبكة الخاصة الافتراضية والمصادقة متعددة العوامل لجميع الوظائف الإدارية حتى يتوفر تصحيح أمني.
3. النظر في الانتقال إلى حلول بديلة لإدارة البنية التحتية أو تطبيق سير عمل موافقة يدوية لجميع تغييرات أدوار المستخدمين والدعوات كإجراء تخفيف مؤقت.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-2 (Access Control) ECC-1-3 (Privileged Access Management) ECC-3-1 (Vulnerability Management) ECC-5-1 (Security Monitoring)
🔵 SAMA CSF
IAM-01 (Identity and Access Management) IAM-02 (Privileged Access Management) TVM-01 (Vulnerability Management) MON-01 (Security Monitoring)
🟡 ISO 27001:2022
A.9.2.3 (Management of privileged access rights) A.9.4.1 (Information access restriction) A.12.6.1 (Management of technical vulnerabilities) A.18.2.2 (Compliance with security policies)
📦 Affected Products / CPE 50 entries
coollabs:coolify
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
📊 CVSS Score
8.0
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredL — Low / Local
User InteractionR — Required
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.0
CWECWE-863
EPSS0.04%
Exploit ✓ Yes
Patch ✓ Yes
Published 2026-01-05
Source Feed nvd
Views 1
🇸🇦 Saudi Risk Score
9.0
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
exploit-available CWE-863
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.