Skip to main content

CVE-2025-57749: CWE-59: Improper Link Resolution Before File Access ('Link Following') in n8n-io n8n

Medium
VulnerabilityCVE-2025-57749cvecve-2025-57749cwe-59
Published: Wed Aug 20 2025 (08/20/2025, 21:46:39 UTC)
Source: CVE Database V5
Vendor/Project: n8n-io
Product: n8n

Description

n8n is a workflow automation platform. Before 1.106.0, a symlink traversal vulnerability was discovered in the Read/Write File node in n8n. While the node attempts to restrict access to sensitive directories and files, it does not properly account for symbolic links (symlinks). An attacker with the ability to create symlinks—such as by using the Execute Command node—could exploit this to bypass the intended directory restrictions and read from or write to otherwise inaccessible paths. Users of n8n.cloud are not impacted. Affected users should update to version 1.106.0 or later.

AI-Powered Analysis

AILast updated: 08/20/2025, 22:18:27 UTC

Technical Analysis

CVE-2025-57749 is a symlink traversal vulnerability affecting versions of the n8n workflow automation platform prior to 1.106.0. The vulnerability resides in the Read/Write File node, which is designed to restrict access to sensitive directories and files. However, the node fails to properly handle symbolic links (symlinks), allowing an attacker who can create symlinks—such as through the Execute Command node—to bypass these directory restrictions. By exploiting this flaw, an attacker can read from or write to files and directories that should be inaccessible, potentially exposing sensitive data or modifying critical files. The vulnerability is classified under CWE-59 (Improper Link Resolution Before File Access), indicating a failure to securely resolve symlinks before file operations. The CVSS v3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and no availability impact (A:N). Notably, users of the n8n.cloud managed service are not affected, as this vulnerability pertains to self-hosted instances. No known exploits are currently reported in the wild, but the vulnerability poses a significant risk due to the potential for unauthorized file access and modification. The recommended remediation is to upgrade to n8n version 1.106.0 or later, where the issue has been fixed.

Potential Impact

For European organizations using self-hosted n8n instances, this vulnerability could lead to unauthorized disclosure of sensitive information, including configuration files, credentials, or proprietary data, due to the high confidentiality impact. Although the vulnerability does not affect integrity or availability directly, unauthorized write access could enable attackers to modify files, potentially leading to further compromise or persistence. Given that n8n is often used to automate workflows involving business-critical processes, exploitation could disrupt operations indirectly or facilitate lateral movement within networks. The requirement for attacker privileges to create symlinks limits the attack surface to insiders or attackers who have already gained limited access, but the lack of required user interaction and low attack complexity means exploitation could be automated once initial access is obtained. European organizations in sectors such as finance, healthcare, manufacturing, and government that rely on n8n for automation could face data breaches or compliance violations under GDPR if sensitive personal data is exposed. The impact is heightened by the potential difficulty in detecting such symlink traversal attacks, as they exploit legitimate workflow nodes.

Mitigation Recommendations

Beyond the essential step of upgrading to n8n version 1.106.0 or later, European organizations should implement strict access controls on who can create or execute workflows, especially those involving the Execute Command and Read/Write File nodes. Restrict permissions to trusted administrators and enforce the principle of least privilege to minimize the risk of symlink creation by unauthorized users. Employ runtime monitoring and file integrity monitoring to detect unusual file access patterns or modifications indicative of exploitation attempts. Network segmentation can limit exposure of n8n instances to trusted internal networks only. Additionally, conduct regular audits of workflow configurations to identify potentially dangerous nodes or scripts that could be abused. Organizations should also consider deploying endpoint detection and response (EDR) solutions capable of detecting suspicious command executions or symlink manipulations. Finally, maintain up-to-date backups of critical data to recover from potential unauthorized modifications.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-19T15:16:22.915Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a64608ad5a09ad000943db

Added to database: 8/20/2025, 10:02:48 PM

Last enriched: 8/20/2025, 10:18:27 PM

Last updated: 8/21/2025, 12:54:34 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats