CVE-2026-25055
BaseFortify
Publication date: 2026-02-04
Last updated on: 2026-02-05
Assigner: GitHub, Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| n8n | n8n | to 1.123.12 (exc) |
| n8n | n8n | From 2.0.0 (inc) to 2.4.0f (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-22 | The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the n8n workflow automation platform prior to versions 1.123.12 and 2.4.0. It occurs when workflows process uploaded files and transfer them to remote servers using the SSH node without validating the files' metadata. Because of this lack of validation, files can be written to unintended locations on the remote systems.
An unauthenticated attacker who knows about the existence of such workflows and has access to unauthenticated file upload endpoints can exploit this vulnerability.
The consequence of this vulnerability can be remote code execution on the affected remote systems.
How can this vulnerability impact me? :
This vulnerability can allow an unauthenticated attacker to write files to unintended locations on remote servers, potentially leading to remote code execution on those systems.
Such unauthorized file writes and remote code execution can compromise the integrity, confidentiality, and availability of the affected systems.
If you use n8n workflows that handle file uploads and transfer files via SSH nodes without proper validation, your systems could be at risk of being compromised by attackers exploiting this vulnerability.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
I don't know
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, upgrade n8n to version 1.123.12 or later, or version 2.4.0 or later, where the issue has been patched.
Additionally, ensure that endpoints for file uploads are not unauthenticated to prevent unauthenticated attackers from exploiting the vulnerability.