PT-2026-6259 · N8N · N8N

Cristianstaicu

+9

·

Published

2026-02-04

·

Updated

2026-03-31

·

CVE-2026-25049

CVSS v3.1

9.9

Critical

VectorAV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions n8n versions prior to 1.123.17 n8n versions prior to 2.5.2
Description n8n is an open-source workflow automation platform. An authenticated user with permission to create or modify workflows can exploit crafted expressions in workflow parameters to trigger system command execution on the host running n8n. This allows for potential full server compromise, including the theft of API keys, credentials, and secrets. The issue stems from an expression escape vulnerability and incomplete AST-based sanitization. Public exploits are available.
Recommendations Upgrade to n8n version 1.123.17 or later. Upgrade to n8n version 2.5.2 or later. As a temporary workaround, limit workflow creation and editing permissions to fully trusted users only. Deploy n8n in a hardened environment with restricted operating system privileges and network access.

Exploit

Fix

RCE

Weakness Enumeration

Related Identifiers

BDU:2026-01284
CVE-2026-25049
GHSA-6CQR-8CFR-67F8

Affected Products

N8N