CVE-2025-61917: CWE-668: Exposure of Resource to Wrong Sphere in n8n-io n8n
n8n is an open source workflow automation platform. From version 1.65.0 to before 1.114.3, the use of Buffer.allocUnsafe() and Buffer.allocUnsafeSlow() in the task runner allowed untrusted code to allocate uninitialized memory. Such uninitialized buffers could contain residual data from within the same Node.js process (for example, data from prior requests, tasks, secrets, or tokens), resulting in potential information disclosure. This issue has been patched in version 1.114.3.
AI Analysis
Technical Summary
The vulnerability CVE-2025-61917 affects the n8n open source workflow automation platform, specifically versions from 1.65.0 up to but not including 1.114.3. The root cause is the use of Node.js Buffer.allocUnsafe() and Buffer.allocUnsafeSlow() functions in the task runner component. These functions allocate memory buffers without initializing them, meaning the buffers may contain leftover data from previous operations within the same Node.js process. Since n8n executes workflows that may include untrusted or user-supplied code, this uninitialized memory can expose sensitive information such as tokens, secrets, or data from prior requests. The vulnerability falls under CWE-668 (Exposure of Resource to Wrong Sphere) and CWE-200 (Information Exposure). Exploitation requires the ability to run code within the n8n task runner context but does not require user interaction. The vulnerability impacts confidentiality severely but does not affect integrity or availability. The issue was addressed and patched in n8n version 1.114.3. No known exploits are reported in the wild yet, but the potential for information leakage is significant due to the nature of the exposed data. The CVSS v3.1 score is 7.7 (high), reflecting network attack vector, low attack complexity, low privileges required, no user interaction, and a scope change with high confidentiality impact.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on n8n for critical automation workflows that handle sensitive data such as personal information, authentication tokens, or proprietary business logic. The exposure of residual memory data could lead to leakage of confidential information, potentially violating GDPR and other data protection regulations. This could result in regulatory fines, reputational damage, and loss of customer trust. Organizations in sectors like finance, healthcare, and government, where automation platforms are increasingly used, may face higher risks. Additionally, attackers gaining access to sensitive tokens or secrets could escalate privileges or move laterally within networks. The vulnerability does not directly affect system availability or data integrity but compromises confidentiality, which is critical in many European regulatory frameworks.
Mitigation Recommendations
The primary mitigation is to upgrade all affected n8n instances to version 1.114.3 or later, where the unsafe buffer allocation has been corrected. Organizations should audit their workflows to identify any that execute untrusted code or handle sensitive data, and apply strict access controls to limit who can create or modify workflows. Implement runtime monitoring to detect unusual access patterns or data exfiltration attempts. Additionally, consider isolating n8n task runners in containerized or sandboxed environments to reduce the impact of potential memory exposure. Regularly review and rotate secrets and tokens used within workflows to minimize the window of exposure. Finally, ensure that Node.js and related dependencies are kept up to date to benefit from security improvements.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Denmark, Belgium
CVE-2025-61917: CWE-668: Exposure of Resource to Wrong Sphere in n8n-io n8n
Description
n8n is an open source workflow automation platform. From version 1.65.0 to before 1.114.3, the use of Buffer.allocUnsafe() and Buffer.allocUnsafeSlow() in the task runner allowed untrusted code to allocate uninitialized memory. Such uninitialized buffers could contain residual data from within the same Node.js process (for example, data from prior requests, tasks, secrets, or tokens), resulting in potential information disclosure. This issue has been patched in version 1.114.3.
AI-Powered Analysis
Technical Analysis
The vulnerability CVE-2025-61917 affects the n8n open source workflow automation platform, specifically versions from 1.65.0 up to but not including 1.114.3. The root cause is the use of Node.js Buffer.allocUnsafe() and Buffer.allocUnsafeSlow() functions in the task runner component. These functions allocate memory buffers without initializing them, meaning the buffers may contain leftover data from previous operations within the same Node.js process. Since n8n executes workflows that may include untrusted or user-supplied code, this uninitialized memory can expose sensitive information such as tokens, secrets, or data from prior requests. The vulnerability falls under CWE-668 (Exposure of Resource to Wrong Sphere) and CWE-200 (Information Exposure). Exploitation requires the ability to run code within the n8n task runner context but does not require user interaction. The vulnerability impacts confidentiality severely but does not affect integrity or availability. The issue was addressed and patched in n8n version 1.114.3. No known exploits are reported in the wild yet, but the potential for information leakage is significant due to the nature of the exposed data. The CVSS v3.1 score is 7.7 (high), reflecting network attack vector, low attack complexity, low privileges required, no user interaction, and a scope change with high confidentiality impact.
Potential Impact
For European organizations, the impact of this vulnerability can be substantial, especially for those relying on n8n for critical automation workflows that handle sensitive data such as personal information, authentication tokens, or proprietary business logic. The exposure of residual memory data could lead to leakage of confidential information, potentially violating GDPR and other data protection regulations. This could result in regulatory fines, reputational damage, and loss of customer trust. Organizations in sectors like finance, healthcare, and government, where automation platforms are increasingly used, may face higher risks. Additionally, attackers gaining access to sensitive tokens or secrets could escalate privileges or move laterally within networks. The vulnerability does not directly affect system availability or data integrity but compromises confidentiality, which is critical in many European regulatory frameworks.
Mitigation Recommendations
The primary mitigation is to upgrade all affected n8n instances to version 1.114.3 or later, where the unsafe buffer allocation has been corrected. Organizations should audit their workflows to identify any that execute untrusted code or handle sensitive data, and apply strict access controls to limit who can create or modify workflows. Implement runtime monitoring to detect unusual access patterns or data exfiltration attempts. Additionally, consider isolating n8n task runners in containerized or sandboxed environments to reduce the impact of potential memory exposure. Regularly review and rotate secrets and tokens used within workflows to minimize the window of exposure. Finally, ensure that Node.js and related dependencies are kept up to date to benefit from security improvements.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-03T22:21:59.615Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69837ea2f9fa50a62f9d1904
Added to database: 2/4/2026, 5:15:14 PM
Last enriched: 2/4/2026, 5:31:58 PM
Last updated: 2/7/2026, 10:14:57 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.