Skip to main content

CVE-2025-55526: n/a

High
VulnerabilityCVE-2025-55526cvecve-2025-55526
Published: Tue Aug 26 2025 (08/26/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

n8n-workflows Main Commit ee25413 allows attackers to execute a directory traversal via the download_workflow function within api_server.py

AI-Powered Analysis

AILast updated: 08/26/2025, 14:17:46 UTC

Technical Analysis

CVE-2025-55526 is a directory traversal vulnerability identified in the n8n-workflows project, specifically within the download_workflow function of the api_server.py component. Directory traversal vulnerabilities occur when an application improperly sanitizes user input, allowing attackers to manipulate file paths and access files and directories outside the intended scope. In this case, the vulnerability enables an attacker to craft a malicious request to the download_workflow function, potentially retrieving arbitrary files from the server's filesystem. This can lead to unauthorized disclosure of sensitive information, including configuration files, credentials, or other critical data stored on the server. The vulnerability is present in an unspecified version of n8n-workflows, and no patch or fix has been linked yet. As of the published date, there are no known exploits in the wild. The lack of a CVSS score indicates that the vulnerability is newly disclosed and has not yet been fully assessed or scored by standard frameworks. The vulnerability's exploitation requires the attacker to interact with the API endpoint, but it is unclear whether authentication is required, which affects the ease of exploitation and potential impact. Given that n8n is an open-source workflow automation tool used to integrate various services and automate tasks, exploitation of this vulnerability could compromise the integrity and confidentiality of workflows and data processed by affected instances.

Potential Impact

For European organizations using n8n-workflows, this vulnerability poses a significant risk to data confidentiality and system integrity. Attackers exploiting the directory traversal could access sensitive files on servers hosting n8n instances, potentially exposing credentials, internal configurations, or proprietary data. This could lead to further compromise, including lateral movement within networks or data exfiltration. Organizations relying on n8n for critical automation workflows may experience disruption or manipulation of these workflows, impacting business operations. Given the increasing adoption of automation tools in Europe across sectors such as finance, healthcare, and manufacturing, the vulnerability could have wide-reaching consequences if exploited. The absence of known exploits currently provides a window for proactive mitigation, but the risk remains high if attackers develop exploit code. Additionally, compliance with European data protection regulations like GDPR necessitates prompt action to prevent unauthorized data access and potential breaches.

Mitigation Recommendations

European organizations should immediately audit their use of n8n-workflows to identify exposed instances, especially those accessible from the internet or untrusted networks. Until an official patch is released, organizations should implement strict network-level access controls to restrict access to the API server, limiting it to trusted IP addresses and internal networks. Employing web application firewalls (WAFs) with custom rules to detect and block directory traversal patterns in API requests can provide additional protection. Monitoring and logging API access to detect unusual or unauthorized requests targeting the download_workflow function is critical for early detection. Organizations should also review and harden file system permissions on servers hosting n8n to minimize the impact of potential unauthorized file access. Once a patch or update is available from the n8n project, prompt application of the fix is essential. Additionally, consider isolating n8n instances in segmented network zones to limit potential lateral movement in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-13T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68adbe86ad5a09ad0058a5a6

Added to database: 8/26/2025, 2:02:46 PM

Last enriched: 8/26/2025, 2:17:46 PM

Last updated: 8/26/2025, 2:17:46 PM

Views: 2

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats