Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57749: CWE-59: Improper Link Resolution Before File Access ('Link Following') in n8n-io n8n

0
Medium
VulnerabilityCVE-2025-57749cvecve-2025-57749cwe-59
Published: Wed Aug 20 2025 (08/20/2025, 21:46:39 UTC)
Source: CVE Database V5
Vendor/Project: n8n-io
Product: n8n

Description

n8n is a workflow automation platform. Before 1.106.0, a symlink traversal vulnerability was discovered in the Read/Write File node in n8n. While the node attempts to restrict access to sensitive directories and files, it does not properly account for symbolic links (symlinks). An attacker with the ability to create symlinks—such as by using the Execute Command node—could exploit this to bypass the intended directory restrictions and read from or write to otherwise inaccessible paths. Users of n8n.cloud are not impacted. Affected users should update to version 1.106.0 or later.

AI-Powered Analysis

AILast updated: 08/28/2025, 01:28:58 UTC

Technical Analysis

CVE-2025-57749 is a symlink traversal vulnerability identified in the n8n workflow automation platform, specifically affecting versions prior to 1.106.0. The vulnerability resides in the Read/Write File node, which is designed to restrict access to sensitive directories and files. However, it improperly handles symbolic links (symlinks), allowing an attacker who can create symlinks—potentially via the Execute Command node—to bypass these directory restrictions. This enables unauthorized reading from or writing to file system paths that should otherwise be inaccessible. The vulnerability is classified under CWE-59 (Improper Link Resolution Before File Access), which typically involves the failure to properly resolve symbolic links before accessing files, leading to unauthorized file system access. The CVSS v3.1 base score is 6.5 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring privileges (PR:L), no user interaction (UI:N), unchanged scope (S:U), high confidentiality impact (C:H), no integrity impact (I:N), and no availability impact (A:N). Notably, users of the n8n.cloud managed service are not affected. The vulnerability does not currently have known exploits in the wild. Exploitation requires an attacker to have some level of privileges within the n8n environment to create symlinks, but once exploited, it can lead to significant confidentiality breaches by exposing sensitive files outside the intended scope of the Read/Write File node. The issue was publicly disclosed on August 20, 2025, and remediation is available by upgrading to version 1.106.0 or later.

Potential Impact

For European organizations utilizing n8n for workflow automation, this vulnerability poses a significant confidentiality risk. Attackers with limited privileges inside the n8n environment could escalate their access to sensitive files, potentially exposing confidential business data, credentials, or configuration files that could facilitate further compromise. Given that n8n is often used to automate business-critical processes, unauthorized file access could lead to data leakage, intellectual property theft, or exposure of personal data subject to GDPR regulations, thereby incurring regulatory penalties and reputational damage. The absence of integrity and availability impacts limits the scope of damage to confidentiality, but the ease of exploitation (low complexity) and network accessibility increase the risk profile. Since n8n is open-source and self-hosted by many organizations, the attack surface depends on the deployment environment and access controls. European organizations relying on self-hosted n8n instances without strict privilege separation or monitoring are particularly vulnerable. However, users of the n8n.cloud managed service are not impacted, reducing risk for organizations using the cloud offering.

Mitigation Recommendations

1. Immediate upgrade to n8n version 1.106.0 or later to apply the patch that properly handles symlink resolution in the Read/Write File node. 2. Restrict the use of the Execute Command node or limit its permissions to trusted users only, as it can be leveraged to create symlinks and exploit the vulnerability. 3. Implement strict role-based access control (RBAC) within n8n to minimize the number of users who can create or modify workflows that include file system access nodes. 4. Monitor and audit workflow executions and file system access logs for unusual activity, particularly creation of symlinks or access to sensitive directories. 5. Employ file system permissions and containerization/isolation techniques to limit the impact of any potential symlink traversal attempts. 6. For organizations unable to immediately upgrade, consider disabling or restricting the Read/Write File node functionality temporarily. 7. Educate administrators and developers on secure workflow design to avoid unnecessary exposure of file system operations. 8. Regularly review and update incident response plans to include scenarios involving workflow automation platform compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
GitHub_M
Date Reserved
2025-08-19T15:16:22.915Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a64608ad5a09ad000943db

Added to database: 8/20/2025, 10:02:48 PM

Last enriched: 8/28/2025, 1:28:58 AM

Last updated: 10/5/2025, 8:33:54 AM

Views: 66

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats