Cloudron makes it easy to run web apps like WordPress, Nextcloud, GitLab on your server. Find out more or install now.


Skip to content
  • Contacts - Package Updates

    Pinned Contacts
    4
    0 Votes
    4 Posts
    89 Views
    Package UpdatesP
    [0.4.0] Update contacts to 0.4.0 Fix contact count when saving address book settings Remain in settings view when address book name changes Improve info labels
  • 2 Votes
    2 Posts
    21 Views
    nebulonN
    I see, I guess since I only use 24h format, the 160px was always wide enough. Fixed for next release with https://git.cloudron.io/platform/box/-/commit/a5da68a7f9fa0ef616299b36a13faba0fea2ca8a
  • Workflow timeout after 300s?

    N8N
    4
    1 Votes
    4 Posts
    13 Views
    jamesJ
    If your workflow takes more then 5 minutes to complete, you should increase the timeout time.
  • Cannot add group images: Error 403 Forbidden

    Solved GitLab
    3
    0 Votes
    3 Posts
    16 Views
    nebulonN
    New package is out which fixes this issue.
  • GitLab - Package Updates

    Pinned GitLab
    231
    1 Votes
    231 Posts
    215k Views
    Package UpdatesP
    [1.114.2] Fix avatar uploads
  • Komga - Package Updates

    Pinned Komga
    26
    0 Votes
    26 Posts
    6k Views
    Package UpdatesP
    [1.6.2] Update komga to 1.24.2 Full Changelog remove anonymous /tmp volume (45f39b0), closes #​2191 fallback on epub2 toc if epub3 is present but invalid (4ce8f27) epub extension could get lost during book restoration (90d3a1d)
  • API for SSL certificate per domain

    Moved Discuss
    4
    0 Votes
    4 Posts
    10 Views
    jamesJ
    Hello @potemkin_ai You can already configure each domain to not use wildcard. This is also documented here: https://docs.cloudron.io/domains#certificates go into your dashboard click Domains click the Edit button next to a domain click Advanced settings… Under Certificate provider select Let's Encrypt Prod or did I misunderstand what you are looking for? If this is indeed what you need, can we improve something to make this information more accessible?
  • InvoiceNinja - Package Updates

    Pinned Invoice Ninja
    568
    0 Votes
    568 Posts
    871k Views
    Package UpdatesP
    [1.22.6] Update invoiceninja to 5.13.8 Full Changelog Refactor for PEPPOL to support CTC countries Fixes for invoice invitation race condition Fixes for client contact observer Remove redundant illuminate $request methods Fixes for multiple areas of the auth stack for route model binding Purify additional areas of client portal
  • Change Detection - Package Updates

    Pinned Change Detection
    147
    1 Votes
    147 Posts
    49k Views
    Package UpdatesP
    [1.29.6] Update changedetection.io to 0.54.7 Full Changelog XPath json-doc() Arbitrary File Read Bypass ( Similar fix as CVE-2026-29039 ) CVE-2026-33981 - Environment Variable Disclosure via jq env Builtin in Include Filters UI - Text tidyup by @​dgtlmoon in #​3989 Realtime - Suppress socket.io errors in logs by @​dgtlmoon in #​3991 Restock - Add previous_price to restock values #​3987 by @​dgtlmoon in #​3993 fix: correct critical errors in Spanish (es) translation by @​rasputino in #​3994 last_error should be cleared if page content was the same and there was no error by @​dgtlmoon in #​3997 fix: Czech translation strings updated by @​svetlemodry in #​4008
  • How to use Playwright in n8n?

    N8N
    3
    0 Votes
    3 Posts
    20 Views
    O
    @james Thank you @james! I was under the (wrong) impression that it was already installed (due to it being listed in /app/code/node_modules, thank you so much for clarifying. Having chromium (for eg. playwright) would probably be a good thing. I can imagine several use cases where a headless web browser could be useful.
  • Constant LDAP/OCID errors in Outlook – Timeout or Server Issue?

    Unsolved Support
    2
    0 Votes
    2 Posts
    13 Views
    nebulonN
    To narrow down the issue a bit, can you create a mailbox on Server A which uses a local account to authenticate and then setup Outlook for that mailbox? If this suffers the same issue, then it is not related to the LDAP binding between those two Cloudrons.
  • MiroTalk Update regularly fails after update

    Moved MiroTalk port bindings
    13
    1 Votes
    13 Posts
    565 Views
    MiroTalkM
    @djxx said: Restarting the app doesn't fix it anymore, so now when it crashes I change the SFU TCP/UDP port range to something else and it works when the app restarts. This issue can occur if another application is already using ports within the 40000–40100 range. To resolve it, you can either change the port range (for example, starting from 25000) [image: 1774513002629-port-conflicts-resized.png] or enable WebRTC server mode in the env (edit it via Cloudron file manager), which requires fewer ports, as described above. SFU_SERVER=true Then restart the instance.
  • Securing cloudron against ddos attacks?

    Discuss security
    19
    2 Votes
    19 Posts
    5k Views
    I
    @LoudLemur said: @IniBudi I am not sure, but according to Grok: "you've got a classic volumetric DDoS (the kind that floods bandwidth with junk traffic like UDP floods or SYN floods) that chewed through 1TB and knocked your server offline. Cloudflare free + Hetzner/Netcup anti-DDoS is a solid starter setup, but it's getting bypassed or overwhelmed because:Most attacks hit your VPS's real IP directly (bypassing Cloudflare unless everything is perfectly proxied). Hetzner's protection (Arbor/Juniper-based) is automated but often slow to kick in or just null-routes your IP (blackholes the whole server to protect their network). Netcup's 2 Tbps filter is better but still leaks big attacks or causes brief downtime. Cloudflare free is unmetered and excellent for web traffic routed through it (absorbs massive attacks at the edge), but it only helps if traffic never reaches your VPS. The 1TB bandwidth bill/spike proves the attack was hitting your origin directly.Immediate Effective Fixes (Do These Right Now — Mostly Free)Force everything through Cloudflare In Cloudflare DNS, make ALL records Proxied (orange cloud icon). No A/AAAA records pointing directly to your VPS IP. This routes attacks to Cloudflare's global network first. Lock your VPS firewall to Cloudflare IPs only (this is the #1 game-changer) Block everything except Cloudflare's published IP ranges. This stops 99% of direct IP attacks. Hetzner: Use their Cloud Firewall (or iptables). Netcup: Same with ufw/iptables. Cloudflare publishes the list here: cloudflare.com/ips (update it automatically via their API — there's a simple cron script for this). Result: Attack traffic dies at Cloudflare; your VPS barely sees clean traffic. Activate Cloudflare's emergency mode Turn on "I'm Under Attack" mode (Security → Overview). Enable Bot Fight Mode + managed WAF rules + rate limiting (free tier has these). Set Security Level to "High" or "I'm Under Attack". This challenges suspicious traffic with JS/captchas before it even reaches your server. Extra quick wins Use Cloudflare Tunnel (cloudflared) if possible — runs on your VPS and proxies traffic without exposing any ports publicly. Zero public IP exposure. On the server: iptables rate limiting + fail2ban for extra layers. Contact your VPS support immediately — they can sometimes manually tune mitigation. These steps alone usually stop the bandwidth massacre because Cloudflare absorbs the junk at their edge (they've mitigated 11+ Tbps attacks).The Strongest Solutions (Ranked by Effectiveness vs Cost)Here's what actually survives big attacks in 2026:Best affordable strong solution: Switch VPS to OVHcloud + keep Cloudflare free/Pro OVH has the strongest built-in, always-on DDoS protection in the budget VPS world (unlimited, multi-Tbps scrubbing centers, rarely null-routes, works great for L3/L4 volumetric). Users consistently report it handles attacks that destroy Hetzner/Netcup. Pair it with Cloudflare for L7 (web) protection and you're basically bulletproof for most attacks. Migration is straightforward (snapshot your server, spin up OVH VPS, point DNS). This is the combo I recommend for 90% of people in your spot. Specialized DDoS-protected hosting DDoS-Guard (or similar like PATH.net / Evolution Host): Purpose-built for heavy volumetric attacks. Offers protected VPS or proxy services with fixed pricing and excellent filtering. Great if you want to stay cheap but stronger than Hetzner/Netcup. BuyVM: Super cheap add-on protection (handles 700M+ pps). Upgrade Cloudflare only (if you love your current VPS) Go Pro ($20/mo) for advanced WAF, better rate limiting, and more rules. Still use the firewall lockdown above. For non-HTTP/UDP (games, APIs, etc.), you'll eventually need Cloudflare Spectrum (paid) or a dedicated L4 protector. Enterprise-level (if budget allows and attacks are constant) Cloudflare Magic Transit (BGP routing) + your VPS, or Akamai/Imperva. These are what big sites use — full network scrubbing. Quick Reality CheckIf your server is a website/API (HTTP/HTTPS), the Cloudflare + firewall lockdown + OVH combo will solve 95% of cases for very low cost. If it's a game server, UDP-heavy service, or Minecraft/etc., prioritize a host with native L4 protection (OVH or specialized like TCPShield) — Cloudflare free alone won't proxy those ports easily.The core principle for any strong solution: You need high-capacity upstream scrubbing so the 1TB flood never reaches your VPS bandwidth/CPU.Do the immediate firewall + proxy steps first — that often fixes it instantly without spending anything. If you tell me exactly what your server runs (website? game? API? ports?), attack type (from CF analytics), or your budget, I can give exact config commands/scripts or migration steps. " I already created inbound traffic firewall only accept Cloudflare IPs. Unfortunately, my server is still down. I don't know why the attacker is targeting my website, the content only talks about Digital Marketing, SEO, etc. Hmm, I am still searching alternative solution because I just use Cloudflare Free and cheap VPS. Thank you for sharing @loudlemur
  • Looking for an App?

    Community Apps
    41
    4 Votes
    41 Posts
    2k Views
    scookeS
    I just want to say that this community fed, driven, produced work is wonderful. AND, I will always keep paying for my Cloudron! The people and the(ir) tech behind Cloudron has made this wonder possible. Thank you.
  • Grafana - Package Updates

    Pinned Grafana
    151
    1 Votes
    151 Posts
    125k Views
    Package UpdatesP
    [2.4.2] Update grafana to 12.4.2 Full Changelog Analytics tab: Improve voice over accessibility (Enterprise) Dashboards a11y: Do not open time zonemenu on focus #​120388, @​idastambuk Dashboards: Resolve display names by identity in version history #​120273, @​ivanortegaalba Plugins: Forward AWS SDK credential chain env vars to external AWS plugins #​120209, @​kevinwcyu Public Dashboards: Prevent unintended CRUD operations from different orgs #​120457, @​mmandrus IAM: Handle NULL team_member.external column to fix dashboard loading #​120179, @​difro Plugins: Fix installer IsDisabled condition #​120568, @​andresmgot Plugins: Forward PLUGIN_UNIX_SOCKET_DIR to plugin processes to fix tmp dir in restricted environments #​120275, @​HarshadaGawas05 Security: Fixes CVE-2026-27876 Security: Fixes CVE-2026-27877
  • Chatwoot - Package Updates

    Pinned Chatwoot
    96
    2 Votes
    96 Posts
    46k Views
    Package UpdatesP
    [1.50.1] Update chatwoot to 4.12.1 Full Changelog Fixed an issue where AI Assist returned a 404 error in the Community Edition. Fixed a regression introduced in v4.8.0 where webhook payloads for message_created and message_updated were sending channel-rendered HTML instead of the original raw message content.
  • OpenWebUI - Package Updates

    Pinned OpenWebUI
    198
    1 Votes
    198 Posts
    94k Views
    Package UpdatesP
    [3.2.10] Update open-webui to 0.8.11 Full Changelog Responses API streaming improvements. The OpenAI proxy now properly handles tool call streaming and re-invocations in the Responses API, preventing duplicate tool calls and preserving output during model re-invocations. Commit, Commit, Commit, Commit Responses API stateful sessions. Administrators can now enable experimental stateful session support via the ENABLE_RESPONSES_API_STATEFUL environment variable, allowing compatible backends to store responses server-side with previous_response_id anchoring for improved multi-turn conversations. Commit File viewing pagination. The view_file and view_knowledge_file tools now support pagination with offset and max_chars parameters, allowing models to read large files in chunks. Commit Knowledge search scoping. The search_knowledge_files tool now respects model-attached knowledge, searching only within attached knowledge bases and files when available. Commit Tool HTML embed context. Tools can now return custom context alongside HTML embeds by using a tuple format, providing the LLM with actionable information instead of a generic message. #​22691 Trusted role header configuration. Administrators can now configure the WEBUI_AUTH_TRUSTED_ROLE_HEADER environment variable to set user roles (admin, user, or pending) via a trusted header from their identity provider or reverse proxy. #​22523 OIDC authorization parameter injection. Administrators can now inject extra parameters into the OIDC authorization redirect URL via the OAUTH_AUTHORIZE_PARAMS environment variable, enabling IdP pre-selection for brokers like CILogon and Keycloak. #​22863, Commit Google OAuth session persistence. Administrators can now configure Google OAuth to issue refresh tokens via the GOOGLE_OAUTH_AUTHORIZE_PARAMS environment variable, preventing OAuth sessions from expiring after one hour and ensuring tools and integrations that rely on OAuth tokens remain functional. #​22652 Embed prompt confirmation. Interactive tool embeds can now submit prompts to the chat without requiring same-origin access, showing a confirmation dialog for cross-origin requests to prevent abuse. #​22908 Tool binary response handling. Tool servers can now return binary data such as images, which are properly processed and displayed in chat for both multimodal and non-multimodal models. Commit, Commit
  • Metabase - Package Updates

    Pinned Metabase
    529
    1 Votes
    529 Posts
    424k Views
    Package UpdatesP
    [3.3.1] Update metabase to 0.59.4.2 Full Changelog
  • Linkwarden - Package Updates

    Pinned Linkwarden
    57
    2 Votes
    57 Posts
    13k Views
    Package UpdatesP
    [1.21.0] Update linkwarden to 2.14.0 Full Changelog Improved team collaboration Improved tag browsing with pagination Faster interface with optimistic rendering Platform upgrades: Next.js 15 and Expo 54 Improved user experience Security improvements for submitted links
  • MiroTalk - Package Updates

    Pinned MiroTalk
    594
    2 Votes
    594 Posts
    419k Views
    Package UpdatesP
    [2.6.20] Update mirotalksfu to 2.1.63