Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-61917: CWE-668: Exposure of Resource to Wrong Sphere in n8n-io n8n

0
High
VulnerabilityCVE-2025-61917cvecve-2025-61917cwe-668cwe-200
Published: Wed Feb 04 2026 (02/04/2026, 16:46:42 UTC)
Source: CVE Database V5
Vendor/Project: n8n-io
Product: n8n

Description

n8n is an open source workflow automation platform. From version 1.65.0 to before 1.114.3, the use of Buffer.allocUnsafe() and Buffer.allocUnsafeSlow() in the task runner allowed untrusted code to allocate uninitialized memory. Such uninitialized buffers could contain residual data from within the same Node.js process (for example, data from prior requests, tasks, secrets, or tokens), resulting in potential information disclosure. This issue has been patched in version 1.114.3.

AI-Powered Analysis

AILast updated: 02/04/2026, 17:31:58 UTC

Technical Analysis

The vulnerability CVE-2025-61917 affects the n8n open source workflow automation platform, specifically versions from 1.65.0 up to but not including 1.114.3. The root cause is the use of Node.js Buffer.allocUnsafe() and Buffer.allocUnsafeSlow() functions in the task runner component. These functions allocate memory buffers without initializing them, meaning the buffers may contain leftover data from previous operations within the same Node.js process. Since n8n executes workflows that may include untrusted or user-supplied code, this uninitialized memory can expose sensitive information such as tokens, secrets, or data from prior requests. The vulnerability falls under CWE-668 (Exposure of Resource to Wrong Sphere) and CWE-200 (Information Exposure). Exploitation requires the ability to run code within the n8n task runner context but does not require user interaction. The vulnerability impacts confidentiality severely but does not affect integrity or availability. The issue was addressed and patched in n8n version 1.114.3. No known exploits are reported in the wild yet, but the potential for information leakage is significant due to the nature of the exposed data. The CVSS v3.1 score is 7.7 (high), reflecting network attack vector, low attack complexity, low privileges required, no user interaction, and a scope change with high confidentiality impact.

Potential Impact

For European organizations, the impact of this vulnerability can be substantial, especially for those relying on n8n for critical automation workflows that handle sensitive data such as personal information, authentication tokens, or proprietary business logic. The exposure of residual memory data could lead to leakage of confidential information, potentially violating GDPR and other data protection regulations. This could result in regulatory fines, reputational damage, and loss of customer trust. Organizations in sectors like finance, healthcare, and government, where automation platforms are increasingly used, may face higher risks. Additionally, attackers gaining access to sensitive tokens or secrets could escalate privileges or move laterally within networks. The vulnerability does not directly affect system availability or data integrity but compromises confidentiality, which is critical in many European regulatory frameworks.

Mitigation Recommendations

The primary mitigation is to upgrade all affected n8n instances to version 1.114.3 or later, where the unsafe buffer allocation has been corrected. Organizations should audit their workflows to identify any that execute untrusted code or handle sensitive data, and apply strict access controls to limit who can create or modify workflows. Implement runtime monitoring to detect unusual access patterns or data exfiltration attempts. Additionally, consider isolating n8n task runners in containerized or sandboxed environments to reduce the impact of potential memory exposure. Regularly review and rotate secrets and tokens used within workflows to minimize the window of exposure. Finally, ensure that Node.js and related dependencies are kept up to date to benefit from security improvements.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-03T22:21:59.615Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69837ea2f9fa50a62f9d1904

Added to database: 2/4/2026, 5:15:14 PM

Last enriched: 2/4/2026, 5:31:58 PM

Last updated: 2/7/2026, 10:14:57 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats