CVE-2026-25049

Published Feb 4, 2026

Last updated 5 days ago

Overview

AI description

Automated description summarized from trusted sources.

CVE-2026-25049 is a vulnerability affecting n8n, an open-source workflow automation platform, categorized as an "Improper Control of Dynamically-Managed Code Resources" (CWE-913). This flaw stems from incomplete AST-based sandboxing and weak sandboxing of user-written server-side JavaScript expressions within workflows. An authenticated user with permissions to create or modify workflows can exploit this vulnerability by crafting malicious expressions in workflow parameters. This allows for arbitrary system command execution on the host running n8n, potentially leading to a complete compromise of the n8n instance. Such an exploit could enable an attacker to run arbitrary system commands, steal credentials and sensitive configuration files, access the filesystem and internal systems, pivot to connected cloud accounts, and hijack AI workflows. Patches for this issue are available in n8n versions 1.123.17 and 2.5.2.

Description
n8n is an open source workflow automation platform. Prior to versions 1.123.17 and 2.5.2, an authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. This issue has been patched in versions 1.123.17 and 2.5.2.
Source
security-advisories@github.com
NVD status
Analyzed
Products
n8n

Risk scores

CVSS 4.0

Type
Secondary
Base score
9.4
Impact score
-
Exploitability score
-
Vector string
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
Severity
CRITICAL

CVSS 3.1

Type
Primary
Base score
9.9
Impact score
6
Exploitability score
3.1
Vector string
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Severity
CRITICAL

Weaknesses

security-advisories@github.com
CWE-913

Social media

Hype score
Not currently trending
  1. #exploit 1⃣. CVE-2025-11730: RCE via DDNS configuration in ZYXEL ATP/USG Series https://t.co/3wpBRrMZZh ]-> PoC https://t.co/G6WSyJ6N6q 2⃣. A Deep Dive into CVE-2026-25049: n8n RCE https://t.co/BcChJcETOg 3⃣. The RCE that AMD won’t fix https://t.co/Am5eZH9KGG 4⃣

    @ksg93rd

    8 Feb 2026

    869 Impressions

    3 Retweets

    20 Likes

    9 Bookmarks

    0 Replies

    0 Quotes

  2. Critical n8n Vulnerabilities: CVE-2025-68613 and CVE-2026-25049 Analysis https://t.co/dnlA8vkg4J #CyberSecurity #Vulnerability

    @LandscapeThreat

    5 Feb 2026

    49 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  3. n8n’s CVE-2026-25049 lets an authenticated user craft workflow expressions that break the sandbox and run arbitrary OS commands - a critical 9.4 RCE that bypasses the prior CVE-2025-68613 fix. Upgrade to 1.123.17/2.5.2 or isolate the service now. https://t.co/gIJiGLFkC4 #infose

    @CyberDaily_News

    5 Feb 2026

    33 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  4. Faille critique dans n8n CVE-2026-25049 : vulnérabilité critique contournant un précédent correctif (CVE-2025-68613). Exécution de code possible via workflow ou webhook public. Si vous utilisez n8n, mettez à jour immédiatement. https://t.co/5kCmR1zRB4 #security #cve #n

    @foudreclair

    5 Feb 2026

    62 Impressions

    0 Retweets

    1 Like

    0 Bookmarks

    0 Replies

    0 Quotes

  5. 📌 أعلنت عن ثغرة حاسمة جديدة في منصة n8n لأتمتة التدفقات، CVE-2026-25049، قد تتيح تنفيذ أوامر نظامية عبر مسارات عمل ضارة. بقيمة CVSS 9.4، تعود إلى فشل في تنقية المدخلا

    @Cybercachear

    5 Feb 2026

    71 Impressions

    0 Retweets

    0 Likes

    0 Bookmarks

    0 Replies

    0 Quotes

  6. I recently discovered two new RCE vulnerabilities in n8n. One is a bypass for my previous finding (CVE-2025-68613), and the other is a fresh Command Injection in the Git Node. 1. The Sandbox Escape (CVE-2026-25049) I managed to bypass the fix for my original report

    @fatihclk01

    4 Feb 2026

    13911 Impressions

    30 Retweets

    166 Likes

    65 Bookmarks

    7 Replies

    3 Quotes

Configurations