INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 2h Global phishing Multiple sectors HIGH 3h Global insider Cybersecurity Services CRITICAL 3h Global ransomware Multiple sectors (U.S. companies) CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 4h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 2h Global phishing Multiple sectors HIGH 3h Global insider Cybersecurity Services CRITICAL 3h Global ransomware Multiple sectors (U.S. companies) CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 4h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 2h Global phishing Multiple sectors HIGH 3h Global insider Cybersecurity Services CRITICAL 3h Global ransomware Multiple sectors (U.S. companies) CRITICAL 3h Global malware Financial Services, Cryptocurrency CRITICAL 3h Global malware Technology and Cloud Services HIGH 3h Global general Financial Services and E-commerce MEDIUM 3h Global data_breach Social Media and Communications CRITICAL 4h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h
Vulnerabilities

CVE-2025-59158

High ⚡ Exploit Available
Coolify Stored XSS Vulnerability Enables Privilege Escalation via Project Names
CWE-116 — Weakness Type
Published: Jan 5, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
8.0
🔗 NVD Official
📄 Description (English)

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Coolify versions prior to and including v4.0.0-beta.420.6 are vulnerable to a stored cross-site scripting (XSS) attack in the project creation workflow. An authenticated user with low privileges (e.g., member role) can create a project with a maliciously crafted name containing embedded JavaScript. When an administrator later attempts to delete the project or its associated resource, the payload automatically executes in the admin’s browser context. Version 4.0.0-beta.420.7 contains a patch for the issue.

🤖 AI Executive Summary

Coolify versions up to v4.0.0-beta.420.6 contain a stored cross-site scripting (XSS) vulnerability (CWE-116) in the project creation workflow. Low-privileged authenticated users can inject malicious JavaScript into project names that execute in administrator browser contexts during project deletion operations. Active exploits exist with a patch available in version 4.0.0-beta.420.7.

📄 Description (Arabic)

تؤثر هذه الثغرة الأمنية على منصة Coolify لإدارة الخوادم والتطبيقات وقواعد البيانات. تسمح الثغرة للمستخدمين ذوي الصلاحيات المحدودة (مثل دور العضو) بإنشاء مشاريع بأسماء تحتوي على أكواد JavaScript خبيثة مضمنة. عند محاولة المسؤول حذف المشروع أو الموارد المرتبطة به، يتم تنفيذ الكود الضار تلقائياً في سياق متصفح المسؤول، مما يمكّن المهاجم من تصعيد الصلاحيات والوصول إلى بيانات حساسة أو تنفيذ إجراءات إدارية غير مصرح بها. تصنف الثغرة ضمن CWE-116 المتعلقة بالتحقق غير الصحيح من مخرجات الترميز.

🤖 ملخص تنفيذي (AI)

تحتوي إصدارات Coolify حتى v4.0.0-beta.420.6 على ثغرة حقن نصوص برمجية عبر المواقع (XSS) مخزنة (CWE-116) في سير عمل إنشاء المشاريع. يمكن للمستخدمين المصادق عليهم ذوي الصلاحيات المنخفضة حقن أكواد JavaScript ضارة في أسماء المشاريع والتي تُنفذ في سياق متصفح المسؤول أثناء عمليات حذف المشاريع. توجد استغلالات نشطة مع توفر تصحيح في الإصدار 4.0.0-beta.420.7.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 07:27
🇸🇦 Saudi Arabia Impact Assessment
Organizations in Saudi Arabia using Coolify for DevOps infrastructure management face critical risks of administrative account compromise and unauthorized access to sensitive server configurations, databases, and application deployments. This vulnerability enables insider threats and privilege escalation attacks that could violate NCA ECC controls for access management and SAMA CSF requirements for secure system administration.
🏢 Affected Saudi Sectors
تقنية المعلومات والاتصالات الخدمات المالية والمصرفية الخدمات الحكومية التجارة الإلكترونية الرعاية الصحية التعليم
⚖️ Saudi Risk Score (AI)
8.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately upgrade all Coolify instances to version 4.0.0-beta.420.7 or later to apply the security patch addressing the stored XSS vulnerability
2. Conduct a comprehensive audit of all existing project names created by non-administrative users to identify and sanitize any potentially malicious JavaScript payloads embedded in project metadata
3. Implement additional input validation and output encoding controls for all user-supplied data fields, enforce Content Security Policy (CSP) headers, and restrict project creation privileges to trusted administrative users only
🔧 خطوات المعالجة (العربية)
1. الترقية الفورية لجميع نسخ Coolify إلى الإصدار 4.0.0-beta.420.7 أو أحدث لتطبيق التصحيح الأمني الذي يعالج ثغرة XSS المخزنة
2. إجراء مراجعة شاملة لجميع أسماء المشاريع الموجودة التي أنشأها مستخدمون غير إداريين لتحديد وتنظيف أي أكواد JavaScript ضارة محتملة مضمنة في بيانات المشاريع الوصفية
3. تطبيق ضوابط إضافية للتحقق من المدخلات وترميز المخرجات لجميع حقول البيانات المقدمة من المستخدمين، وفرض رؤوس سياسة أمان المحتوى (CSP)، وتقييد صلاحيات إنشاء المشاريع للمستخدمين الإداريين الموثوقين فقط
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
1-2-1 (Secure Development Lifecycle) 1-3-1 (Input Validation) 2-1-1 (Access Control) 3-1-1 (Vulnerability Management) 5-1-2 (Security Monitoring)
🔵 SAMA CSF
CCC-01 (Cybersecurity Controls) CCC-04 (Vulnerability and Patch Management) IAM-01 (Identity and Access Management) TVM-01 (Threat and Vulnerability Management) APP-02 (Application Security)
🟡 ISO 27001:2022
A.8.22 (Segregation of duties) A.8.3 (Privileged access rights) A.14.2.1 (Secure development policy) A.14.2.5 (Secure system engineering principles) A.18.1.3 (Protection of records)
📦 Affected Products / CPE 50 entries
coollabs:coolify
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
coollabs:coolify:4.0.0
📊 CVSS Score
8.0
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredL — Low / Local
User InteractionR — Required
ScopeU — Unchanged
ConfidentialityH — High
IntegrityH — High
AvailabilityH — High
📋 Quick Facts
Severity High
CVSS Score8.0
CWECWE-116
EPSS0.05%
Exploit ✓ Yes
Patch ✓ Yes
Published 2026-01-05
Source Feed nvd
Views 2
🇸🇦 Saudi Risk Score
8.0
/ 10.0 — Saudi Risk
Priority: HIGH
🏷️ Tags
exploit-available CWE-116
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.