{"uuid": "6c90b8ad-ce07-41ed-9588-1c5881a1999b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-22610", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/2952", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-22610\n\ud83d\udd39 Description: Coolify is an open-source and self-hostable tool for managing servers, applications, and databases. Prior to version 4.0.0-beta.361, the missing authorization allows any authenticated user to fetch the global coolify instance OAuth configuration. This exposes the \"client id\" and \"client secret\" for every custom OAuth provider. The attacker can also modify the global OAuth configuration. Version 4.0.0-beta.361 fixes the issue.\n\ud83d\udccf Published: 2025-01-24T16:33:17.058Z\n\ud83d\udccf Modified: 2025-01-24T16:33:17.058Z\n\ud83d\udd17 References:\n1. https://github.com/coollabsio/coolify/security/advisories/GHSA-496v-9q38-2x6c", "creation_timestamp": "2025-01-24T17:05:11.000000Z"}