CVE-2025-49595: CWE-400: Uncontrolled Resource Consumption in n8n-io n8n
n8n is a workflow automation platform. Prior to version 1.99.0, there is a denial of Service vulnerability in /rest/binary-data endpoint when processing empty filesystem URIs (filesystem:// or filesystem-v2://). This allows authenticated attackers to cause service unavailability through malformed filesystem URI requests, effecting the /rest/binary-data endpoint and n8n.cloud instances (confirmed HTTP/2 524 timeout responses). Attackers can exploit this by sending GET requests with empty filesystem URIs (filesystem:// or filesystem-v2://) to the /rest/binary-data endpoint, causing resource exhaustion and service disruption. This issue has been patched in version 1.99.0.
AI Analysis
Technical Summary
CVE-2025-49595 is a medium-severity denial of service (DoS) vulnerability affecting the n8n workflow automation platform versions prior to 1.99.0. The vulnerability arises from uncontrolled resource consumption (CWE-400) in the /rest/binary-data endpoint when processing malformed or empty filesystem URIs such as filesystem:// or filesystem-v2://. Authenticated attackers can exploit this flaw by sending specially crafted GET requests containing these empty filesystem URIs to the vulnerable endpoint. This triggers excessive resource usage on the server, leading to service unavailability characterized by HTTP/2 524 timeout responses. The vulnerability specifically impacts n8n.cloud instances and any self-hosted deployments running affected versions. The root cause is insufficient validation or handling of empty filesystem URI inputs, which causes the backend to consume resources uncontrollably. This issue was addressed and patched in n8n version 1.99.0. The CVSS v3.1 base score is 4.9, reflecting a medium severity level due to the requirement for authenticated access and the impact being limited to availability without affecting confidentiality or integrity. No known exploits are currently reported in the wild, but the vulnerability presents a risk of service disruption for organizations relying on n8n for workflow automation.
Potential Impact
For European organizations utilizing n8n, particularly those leveraging n8n.cloud or self-hosted instances for critical automation workflows, this vulnerability poses a risk of denial of service. Disruption of workflow automation can impact business continuity, delay operational processes, and degrade service quality. Organizations in sectors such as finance, manufacturing, healthcare, and public administration that depend on automated integrations and data processing may experience operational downtime or degraded performance. Although the vulnerability requires authenticated access, insider threats or compromised credentials could enable exploitation. The impact is primarily on availability, with no direct compromise of data confidentiality or integrity. However, prolonged service outages could indirectly affect compliance with regulatory requirements for service availability and operational resilience under frameworks like GDPR and NIS Directive. Given the growing adoption of automation platforms in Europe, the risk of disruption from this vulnerability should be taken seriously.
Mitigation Recommendations
European organizations should promptly upgrade all n8n instances to version 1.99.0 or later to remediate this vulnerability. For environments where immediate upgrading is not feasible, implement strict access controls to limit authenticated user permissions and monitor for anomalous GET requests targeting the /rest/binary-data endpoint with suspicious filesystem URI patterns. Employ Web Application Firewalls (WAFs) or API gateways to detect and block malformed URI requests that could trigger resource exhaustion. Additionally, enforce robust authentication mechanisms including multi-factor authentication (MFA) to reduce the risk of credential compromise. Regularly audit and rotate credentials for n8n users. Implement resource usage monitoring and alerting on n8n servers to detect early signs of resource exhaustion or unusual request patterns. Finally, maintain an incident response plan that includes procedures for mitigating denial of service events affecting automation platforms.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2025-49595: CWE-400: Uncontrolled Resource Consumption in n8n-io n8n
Description
n8n is a workflow automation platform. Prior to version 1.99.0, there is a denial of Service vulnerability in /rest/binary-data endpoint when processing empty filesystem URIs (filesystem:// or filesystem-v2://). This allows authenticated attackers to cause service unavailability through malformed filesystem URI requests, effecting the /rest/binary-data endpoint and n8n.cloud instances (confirmed HTTP/2 524 timeout responses). Attackers can exploit this by sending GET requests with empty filesystem URIs (filesystem:// or filesystem-v2://) to the /rest/binary-data endpoint, causing resource exhaustion and service disruption. This issue has been patched in version 1.99.0.
AI-Powered Analysis
Technical Analysis
CVE-2025-49595 is a medium-severity denial of service (DoS) vulnerability affecting the n8n workflow automation platform versions prior to 1.99.0. The vulnerability arises from uncontrolled resource consumption (CWE-400) in the /rest/binary-data endpoint when processing malformed or empty filesystem URIs such as filesystem:// or filesystem-v2://. Authenticated attackers can exploit this flaw by sending specially crafted GET requests containing these empty filesystem URIs to the vulnerable endpoint. This triggers excessive resource usage on the server, leading to service unavailability characterized by HTTP/2 524 timeout responses. The vulnerability specifically impacts n8n.cloud instances and any self-hosted deployments running affected versions. The root cause is insufficient validation or handling of empty filesystem URI inputs, which causes the backend to consume resources uncontrollably. This issue was addressed and patched in n8n version 1.99.0. The CVSS v3.1 base score is 4.9, reflecting a medium severity level due to the requirement for authenticated access and the impact being limited to availability without affecting confidentiality or integrity. No known exploits are currently reported in the wild, but the vulnerability presents a risk of service disruption for organizations relying on n8n for workflow automation.
Potential Impact
For European organizations utilizing n8n, particularly those leveraging n8n.cloud or self-hosted instances for critical automation workflows, this vulnerability poses a risk of denial of service. Disruption of workflow automation can impact business continuity, delay operational processes, and degrade service quality. Organizations in sectors such as finance, manufacturing, healthcare, and public administration that depend on automated integrations and data processing may experience operational downtime or degraded performance. Although the vulnerability requires authenticated access, insider threats or compromised credentials could enable exploitation. The impact is primarily on availability, with no direct compromise of data confidentiality or integrity. However, prolonged service outages could indirectly affect compliance with regulatory requirements for service availability and operational resilience under frameworks like GDPR and NIS Directive. Given the growing adoption of automation platforms in Europe, the risk of disruption from this vulnerability should be taken seriously.
Mitigation Recommendations
European organizations should promptly upgrade all n8n instances to version 1.99.0 or later to remediate this vulnerability. For environments where immediate upgrading is not feasible, implement strict access controls to limit authenticated user permissions and monitor for anomalous GET requests targeting the /rest/binary-data endpoint with suspicious filesystem URI patterns. Employ Web Application Firewalls (WAFs) or API gateways to detect and block malformed URI requests that could trigger resource exhaustion. Additionally, enforce robust authentication mechanisms including multi-factor authentication (MFA) to reduce the risk of credential compromise. Regularly audit and rotate credentials for n8n users. Implement resource usage monitoring and alerting on n8n servers to detect early signs of resource exhaustion or unusual request patterns. Finally, maintain an incident response plan that includes procedures for mitigating denial of service events affecting automation platforms.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-06-06T15:44:21.557Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68667a046f40f0eb7296713d
Added to database: 7/3/2025, 12:39:32 PM
Last enriched: 7/3/2025, 12:55:07 PM
Last updated: 7/3/2025, 3:29:47 PM
Views: 4
Related Threats
CVE-2025-6071: CWE-321 Use of Hard-coded Cryptographic Key in ABB RMC-100
MediumCVE-2025-49846: CWE-117: Improper Output Neutralization for Logs in wireapp wire-ios
MediumCVE-2025-6074: CWE-321 Use of Hard-coded Cryptographic Key in ABB RMC-100
MediumCVE-2025-6073: CWE-121 Stack-based Buffer Overflow in ABB RMC-100
HighCVE-2025-6072: CWE-121 Stack-based Buffer Overflow in ABB RMC-100
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.