Description

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In Coolify versions up to and including v4.0.0-beta.434, an attacker can initiate a password reset for a victim, and modify the host header of the request to a malicious value. The victim will receive a password reset email, with a link to the malicious host. If the victim clicks this link, their reset token is sent to the attacker's server, allowing the attacker to use it to change the victim's password and takeover their account. As of time of publication, it is unclear if a patch is available.

INFO

Published Date :

2026-01-05T20:49:10.727Z

Last Modified :

2026-01-05T21:48:36.288Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2025-64425 vulnerability.

Vendors Products
Coollabs
  • Coolify
Coollabsio
  • Coolify
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-64425.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact