CVE-2025-64425

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. In Coolify versions up to and including v4.0.0-beta.434, an attacker can initiate a password reset for a victim, and modify the host header of the request to a malicious value. The victim will receive a password reset email, with a link to the malicious host. If the victim clicks this link, their reset token is sent to the attacker's server, allowing the attacker to use it to change the victim's password and takeover their account. As of time of publication, it is unclear if a patch is available.
CVSS

No CVSS.

Configurations

No configuration.

History

05 Jan 2026, 22:15

Type Values Removed Values Added
References () https://github.com/coollabsio/coolify/security/advisories/GHSA-f737-2p93-g2cw - () https://github.com/coollabsio/coolify/security/advisories/GHSA-f737-2p93-g2cw -

05 Jan 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-05 21:16

Updated : 2026-01-05 22:15


NVD link : CVE-2025-64425

Mitre link : CVE-2025-64425

CVE.ORG link : CVE-2025-64425


JSON object : View

Products Affected

No product.

CWE
CWE-644

Improper Neutralization of HTTP Headers for Scripting Syntax