PT-2026-6259 · N8N · N8N

Cristianstaicu

+9

·

Published

2026-02-04

·

Updated

2026-03-11

·

CVE-2026-25049

CVSS v3.1

9.9

Critical

AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions n8n versions prior to 1.123.17 n8n versions prior to 2.5.2
Description n8n is an open source workflow automation platform. A flaw exists where an authenticated user with workflow creation or modification permissions can exploit crafted expressions within workflow parameters to trigger arbitrary system command execution on the host system. This vulnerability bypasses prior fixes and allows for potential remote code execution, potentially leading to credential theft and full host compromise. Public webhooks can be exploited to trigger remote execution.
Recommendations Upgrade n8n to version 1.123.17 or later. Upgrade n8n to version 2.5.2 or later. If upgrading is not immediately possible, limit workflow creation and editing permissions to fully trusted users only. Deploy n8n in a hardened environment with restricted operating system privileges and network access.

Exploit

Fix

RCE

Weakness Enumeration

Related Identifiers

BDU:2026-01284
CVE-2026-25049
GHSA-6CQR-8CFR-67F8

Affected Products

N8N