CVE-2025-59955

5.7 MEDIUM
Published: January 05, 2026 Modified: January 12, 2026
View on NVD

Description

Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Coolify versions prior to and including v4.0.0-beta.420.8 have an information disclosure vulnerability in the `/api/v1/teams/{team_id}/members` and `/api/v1/teams/current/members` API endpoints allows authenticated team members to access a highly sensitive `email_change_code` from other users on the same team. This code is intended for a single-use email change verification and should be kept secret. Its exposure could enable a malicious actor to perform an unauthorized email address change on behalf of the victim. As of time of publication, no known patched versions exist.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
https://github.com/coollabsio/coolify/security/advisories/GHSA-927g-56xp-6427
Source: security-advisories@github.com
Exploit Vendor Advisory

1 reference(s) from NVD

Quick Stats

CVSS v3 Score
5.7 / 10.0
EPSS (Exploit Probability)
0.0%
13th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

coollabs