CVE-2025-66411
Coder · Coder Multiple Products
A high-severity vulnerability has been discovered in multiple Coder products, which could allow an attacker to execute arbitrary code within the remote development infrastructure.
Executive summary
A high-severity vulnerability has been discovered in multiple Coder products, which could allow an attacker to execute arbitrary code within the remote development infrastructure. Successful exploitation could lead to the compromise of sensitive source code, credentials, and other intellectual property, potentially enabling further unauthorized access into the corporate network. Organizations are urged to apply the vendor-provided security updates immediately to mitigate this significant risk.
Vulnerability
The vulnerability is an improper input validation flaw within the component that processes Terraform configurations for provisioning development environments. An authenticated attacker with permissions to define or modify environment templates can inject specially crafted commands into certain template parameters. When Coder parses and applies the Terraform configuration, these embedded commands are not properly sanitized and are executed with the privileges of the Coder service account on the underlying infrastructure, leading to remote code execution (RCE).
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.8. Exploitation could have a severe impact on the business by compromising the integrity and confidentiality of the software development lifecycle. An attacker could gain unauthorized access to sensitive source code, API keys, database credentials, and other proprietary information stored within the development environments. This could lead to intellectual property theft, disruption of development operations, and provide a pivot point for an attacker to move laterally across the network into production systems.
Remediation
Immediate Action: Apply the security updates provided by Coder across all affected instances without delay. After patching, it is critical to review access logs for Coder environments, focusing on template and workspace modifications, for any unusual or unauthorized changes preceding the patch application. Monitor for any anomalous outbound network connections from provisioned development environments.
Proactive Monitoring: Security teams should actively monitor for indicators of compromise. This includes looking for unusual shell commands (e.g., curl, wget, nc) in process execution logs on Coder-managed infrastructure, unexpected network traffic originating from developer workspaces to unknown external IP addresses, and any modifications to environment startup scripts or Terraform templates by non-administrative users.
Compensating Controls: If immediate patching is not feasible, organizations should implement compensating controls. Restrict permissions for creating and editing workspace templates to a minimal set of highly trusted administrators. Implement strict network egress filtering on all development environments to block connections to non-essential external services, limiting an attacker's ability to exfiltrate data or establish a command-and-control channel.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high CVSS score of 7.8 and the critical role Coder plays in managing access to sensitive development assets, this vulnerability presents a significant risk to the organization. The primary and most effective mitigation is to apply the vendor-supplied patches immediately. While this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its potential for severe impact makes it a prime target for future exploitation. We strongly recommend prioritizing the remediation of this vulnerability across all affected systems.