INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Multiple sectors HIGH 26m Global insider Cybersecurity Services CRITICAL 36m Global ransomware Multiple sectors (U.S. companies) CRITICAL 49m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 26m Global insider Cybersecurity Services CRITICAL 36m Global ransomware Multiple sectors (U.S. companies) CRITICAL 49m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 26m Global insider Cybersecurity Services CRITICAL 36m Global ransomware Multiple sectors (U.S. companies) CRITICAL 49m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h
Vulnerabilities

CVE-2025-64425

High ⚡ Exploit Available
Coolify Host Header Injection Enables Password Reset Token Theft (CVE-2025-64425)
CWE-644 — Weakness Type
Published: Jan 5, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
8.1
🔗 NVD Official
📄 Description (English)

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In Coolify versions up to and including v4.0.0-beta.434, an attacker can initiate a password reset for a victim, and modify the host header of the request to a malicious value. The victim will receive a password reset email, with a link to the malicious host. If the victim clicks this link, their reset token is sent to the attacker's server, allowing the attacker to use it to change the victim's password and takeover their account. As of time of publication, it is unclear if a patch is available.

🤖 AI Executive Summary

Coolify versions up to v4.0.0-beta.434 contain a host header injection vulnerability (CWE-644) allowing attackers to manipulate password reset emails. By modifying the host header during password reset requests, attackers can redirect victims to malicious servers, capturing reset tokens and enabling full account takeover. Active exploits exist with no patch currently available.

📄 Description (Arabic)

تؤثر هذه الثغرة الأمنية على منصة Coolify لإدارة الخوادم والتطبيقات وقواعد البيانات. يستغل المهاجمون ضعف التحقق من رأس المضيف في آلية إعادة تعيين كلمة المرور، حيث يقومون ببدء طلب إعادة تعيين لحساب الضحية مع تعديل رأس المضيف إلى قيمة ضارة. عندما يتلقى الضحية رسالة إعادة التعيين الإلكترونية ويضغط على الرابط، يتم إرسال رمز إعادة التعيين إلى خادم المهاجم بدلاً من الخادم الشرعي. يمكن للمهاجم بعد ذلك استخدام هذا الرمز لتغيير كلمة مرور الضحية والاستيلاء الكامل على الحساب. تشكل هذه الثغرة خطراً كبيراً خاصة مع عدم توفر تصحيح رسمي حتى الآن ووجود استغلالات نشطة موثقة.

🤖 ملخص تنفيذي (AI)

تحتوي إصدارات Coolify حتى v4.0.0-beta.434 على ثغرة حقن رأس المضيف (CWE-644) تسمح للمهاجمين بالتلاعب برسائل إعادة تعيين كلمة المرور الإلكترونية. من خلال تعديل رأس المضيف أثناء طلبات إعادة تعيين كلمة المرور، يمكن للمهاجمين إعادة توجيه الضحايا إلى خوادم ضارة والاستيلاء على رموز إعادة التعيين مما يمكنهم من السيطرة الكاملة على الحسابات. توجد استغلالات نشطة دون توفر تصحيح حالياً.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 07:30
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations using Coolify for infrastructure management face critical account takeover risks, particularly affecting IT operations teams, cloud service providers, and managed service providers. This vulnerability directly threatens administrative access to critical infrastructure, potentially exposing customer data and violating PDPL requirements for access control and data protection.
🏢 Affected Saudi Sectors
تقنية المعلومات والاتصالات الخدمات السحابية مزودي الخدمات المُدارة القطاع المالي القطاع الحكومي الرعاية الصحية
⚖️ Saudi Risk Score (AI)
8.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately discontinue use of Coolify in production environments until an official patch is released, or implement strict network segmentation to isolate Coolify instances from internet access and require VPN/bastion host access only.
2. Implement web application firewall (WAF) rules to validate and restrict Host header values to only legitimate domain names, blocking requests with suspicious or external host headers at the perimeter.
3. Enable multi-factor authentication (MFA) for all Coolify accounts to add an additional security layer beyond password-based authentication, and monitor authentication logs for suspicious password reset attempts or unusual login patterns from unexpected IP addresses.
🔧 خطوات المعالجة (العربية)
1. إيقاف استخدام Coolify فوراً في بيئات الإنتاج حتى صدور تصحيح رسمي، أو تطبيق تجزئة صارمة للشبكة لعزل نسخ Coolify عن الوصول للإنترنت وطلب الوصول فقط عبر VPN أو مضيف الحصن.
2. تطبيق قواعد جدار حماية تطبيقات الويب (WAF) للتحقق من صحة قيم رأس المضيف وتقييدها للسماح فقط بأسماء النطاقات الشرعية، وحظر الطلبات ذات رؤوس المضيف المشبوهة أو الخارجية عند المحيط الأمني.
3. تفعيل المصادقة متعددة العوامل (MFA) لجميع حسابات Coolify لإضافة طبقة أمان إضافية تتجاوز المصادقة القائمة على كلمة المرور، ومراقبة سجلات المصادقة لاكتشاف محاولات إعادة تعيين كلمة المرور المشبوهة أو أنماط تسجيل الدخول غير المعتادة من عناوين IP غير متوقعة.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-2 ECC-2-1 ECC-3-1 ECC-5-1
🔵 SAMA CSF
SAMA-C1A-1 SAMA-C1A-2 SAMA-C2A-1 SAMA-C5A-1
🟡 ISO 27001:2022
A.9.2.1 A.9.4.1 A.9.4.2 A.13.1.1
📦 Affected Products / CPE 50 entries
coollabs:coolify
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
📊 CVSS Score
8.1
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredN — None / Network
User InteractionR — Required
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityN — None / Network
📋 Quick Facts
Severity High
CVSS Score8.1
CWECWE-644
EPSS0.05%
Exploit ✓ Yes
Patch ✓ Yes
Published 2026-01-05
Source Feed nvd
Views 1
🇸🇦 Saudi Risk Score
8.0
/ 10.0 — Saudi Risk
Priority: HIGH
🏷️ Tags
exploit-available CWE-644
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.