Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows

0
Critical
Exploit
Published: Thu Feb 05 2026 (02/05/2026, 06:16:00 UTC)
Source: The Hacker News

Description

A new, critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in the execution of arbitrary system commands. The flaw, tracked as CVE-2026-25049 (CVSS score: 9.4), is the result of inadequate sanitization that bypasses safeguards put in place to address CVE-2025-68613 (CVSS score: 9.9), another critical defect that

AI-Powered Analysis

AILast updated: 02/05/2026, 06:29:33 UTC

Technical Analysis

The disclosed vulnerability CVE-2026-25049 in the n8n workflow automation platform is a critical security flaw enabling arbitrary system command execution. It arises from insufficient sanitization of workflow parameters, allowing attackers to bypass safeguards implemented after a previous critical vulnerability (CVE-2025-68613). The root cause lies in the discrepancy between TypeScript's compile-time type enforcement and JavaScript's runtime behavior, where malicious runtime inputs can evade type checks and sanitization. An authenticated user with permissions to create or modify workflows can craft expressions using JavaScript destructuring syntax to inject system commands. When combined with n8n's webhook feature, an attacker can create a publicly accessible webhook without authentication, embedding a remote code execution payload. This allows any internet user to trigger the webhook and execute commands on the host server. The impact includes server takeover, credential and sensitive data theft (API keys, cloud credentials, OAuth tokens), filesystem access, lateral movement to connected cloud accounts, and hijacking of AI workflows. The vulnerability affects n8n versions below 1.123.17 and 2.5.2, which have been patched. Multiple security researchers contributed to the discovery and reporting of this flaw. The advisory emphasizes the necessity of layered validation and runtime input checks beyond compile-time type enforcement. Workarounds include restricting workflow creation/editing to trusted users and deploying n8n in environments with restricted OS privileges and network access.

Potential Impact

European organizations using n8n for workflow automation are at high risk of severe operational and data security impacts. Exploitation can lead to full server compromise, enabling attackers to steal critical credentials such as API keys, cloud provider keys, database passwords, and OAuth tokens. This can result in unauthorized access to internal systems, cloud environments, and AI workflows, potentially causing widespread data breaches and service disruptions. The ability to execute arbitrary system commands also allows installation of persistent backdoors, facilitating long-term undetected access. Organizations relying on n8n for business-critical automation or integrating with sensitive cloud services face increased exposure. Publicly accessible webhooks without authentication significantly amplify the attack surface. The breach of AI workflows could undermine trust in automated decision-making systems. Regulatory compliance risks under GDPR and other European data protection laws are heightened due to potential data exfiltration. The operational impact includes downtime, loss of data integrity, and reputational damage.

Mitigation Recommendations

1. Immediately upgrade n8n installations to versions 1.123.17 or 2.5.2 or later to apply official patches addressing CVE-2026-25049. 2. Restrict workflow creation and modification permissions strictly to fully trusted and vetted users to prevent unauthorized injection of malicious workflows. 3. Avoid exposing webhooks publicly without authentication; implement strong authentication and access controls on all webhook endpoints. 4. Deploy n8n in a hardened environment with minimal operating system privileges, using containerization or sandboxing to limit the impact of potential exploitation. 5. Implement network segmentation and firewall rules to restrict inbound and outbound traffic to n8n servers, minimizing exposure to the internet. 6. Conduct thorough code reviews focusing on sanitization functions and runtime input validation, ensuring no assumptions about input types are made solely based on compile-time checks. 7. Monitor workflow activity and webhook usage for anomalous patterns indicative of exploitation attempts. 8. Employ runtime application self-protection (RASP) or intrusion detection systems to detect and block suspicious command execution attempts. 9. Regularly audit and rotate credentials and API keys accessible to n8n workflows to limit damage from potential credential theft. 10. Educate developers and administrators about the risks of injecting untrusted code and the importance of layered security controls.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Article Source
{"url":"https://thehackernews.com/2026/02/critical-n8n-flaw-cve-2026-25049.html","fetched":true,"fetchedAt":"2026-02-05T06:29:16.041Z","wordCount":1160}

Threat ID: 698438bcf9fa50a62f070048

Added to database: 2/5/2026, 6:29:16 AM

Last enriched: 2/5/2026, 6:29:33 AM

Last updated: 2/7/2026, 3:03:50 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats