Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-34157 PoC — Coolify 安全漏洞

Source
Associated Vulnerability
Title:Coolify 安全漏洞 (CVE-2025-34157)
Description:Coolify是coolLabs开源的一个开源和自托管的 Heroku/Netlify/Vercel 替代品。 Coolify v4.0.0-beta.420.6之前版本存在安全漏洞,该漏洞源于项目创建工作流中存在存储型跨站脚本,可能导致完全控制Coolify实例。
Description
A stored XSS in the project delete flow allows execution of attacker-controlled JavaScript in an administrator’s browser when the admin attempts to delete a project created by a low-privileged user. This can lead to takeover of the Coolify instance (cookies, API tokens, WebSocket/terminal actions)
Readme
# Stored XSS in Coolify delete flow (CVE-2025-34157)
 
> **Affects:** Coolify ≤ **v4.0.0-beta.420.6**  
> **Fixed in:** **v4.0.0-beta.420.7**  
> **Severity:** **Critical (9.4)**  
> **CVSS 4.0 Vector:** `CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H`  
> **CWE:** CWE-79 (Cross-Site Scripting), CWE-20 (Improper Input Validation)




## Summary
A stored XSS in the project delete flow allows execution of attacker-controlled JavaScript in an administrator’s browser when the admin attempts to delete a project created by a low-privileged user. This can lead to takeover of the Coolify instance (cookies, API tokens, WebSocket/terminal actions).

- **Attack Vector:** Remote (any authenticated user, incl. member)
- **Privileges Required:** Low
- **User Interaction:** Admin interaction (delete action)
- **Impact:** Account/session takeover, project/resource/terminal access

## Affected versions
- All versions **prior to and including** `v4.0.0-beta.420.6`.

## Proof of Concept (PoC)
Steps and payloads are in [`/POC`](./POC).



File Snapshot

[4.0K] /data/pocs/dc6c2198fc05abefacd880052d64f163f50fc021 ├── [4.0K] POC │   ├── [4.9K] Payloads HTMLi │   ├── [ 461] Payloads XSS │   └── [1.6K] ReadMe.md └── [1.0K] README.md 1 directory, 4 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. If the original source is unavailable, please email f.jinxu#gmail.com for a local snapshot (replace # with @).
    3. Shenlong has snapshotted the POC code for you. To support long-term maintenance, please consider donating. Thank you for your support.