CVE-2026-25049
BaseFortify
Publication date: 2026-02-04
Last updated on: 2026-02-05
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| n8n | n8n | to 1.123.17 (exc) |
| n8n | n8n | From 2.0.0 (inc) to 2.5.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-913 | The product does not properly restrict reading from or writing to dynamically-managed code resources such as variables, objects, classes, attributes, functions, or executable instructions or statements. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability affects the open source workflow automation platform n8n. Before versions 1.123.17 and 2.5.2, an authenticated user who had permission to create or modify workflows could exploit crafted expressions within workflow parameters. By doing so, they could trigger unintended system command execution on the host machine running n8n.
This means that the user could execute commands on the server that were not intended by the system, potentially leading to unauthorized actions or control over the host.
How can this vulnerability impact me? :
The vulnerability allows an authenticated user with workflow creation or modification permissions to execute arbitrary system commands on the host running n8n. This could lead to unauthorized access, data compromise, system disruption, or further exploitation of the host environment.
Because the attacker can run system commands, they might be able to escalate privileges, access sensitive information, modify or delete data, or disrupt services.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, immediately upgrade n8n to version 1.123.17 or later, or version 2.5.2 or later, where the issue has been patched.
Ensure that only trusted authenticated users have permission to create or modify workflows, as the vulnerability requires such permissions to be exploited.