Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62726: CWE-829: Inclusion of Functionality from Untrusted Control Sphere in n8n-io n8n

0
High
VulnerabilityCVE-2025-62726cvecve-2025-62726cwe-829
Published: Thu Oct 30 2025 (10/30/2025, 16:24:11 UTC)
Source: CVE Database V5
Vendor/Project: n8n-io
Product: n8n

Description

CVE-2025-62726 is a high-severity remote code execution vulnerability in n8n versions prior to 1. 113. 0 affecting the Git Node component. The flaw arises when a malicious actor clones a remote Git repository containing a crafted pre-commit hook; using the Commit operation in n8n’s Git Node triggers execution of this hook, allowing arbitrary code execution within the n8n environment. This compromises system integrity, confidentiality of connected credentials, and availability of workflows. The vulnerability requires at least limited privileges (PR:L) but no user interaction and can be exploited remotely. It affects both Cloud and Self-Hosted deployments of n8n. No known exploits are reported in the wild yet. The issue is fixed in version 1. 113.

AI-Powered Analysis

AILast updated: 10/30/2025, 16:55:47 UTC

Technical Analysis

CVE-2025-62726 is a remote code execution vulnerability identified in the open-source workflow automation platform n8n, specifically in its Git Node component available in both Cloud and Self-Hosted versions prior to version 1.113.0. The vulnerability stems from the inclusion of functionality from an untrusted control sphere (CWE-829). When n8n clones a remote Git repository that contains a maliciously crafted pre-commit hook, the subsequent use of the Commit operation in the Git Node inadvertently triggers execution of this hook. This behavior allows an attacker to execute arbitrary code within the n8n runtime environment. The attack vector requires network access and limited privileges (PR:L), but no user interaction is necessary, making exploitation feasible in automated or unattended scenarios. The impact is severe, affecting confidentiality, integrity, and availability: attackers can compromise the system, access or manipulate connected credentials, and disrupt workflows. The vulnerability has a CVSS v3.1 base score of 8.8, reflecting its high severity. Although no known exploits have been reported in the wild, the nature of the vulnerability and the widespread use of n8n in automation workflows make it a critical risk. The issue is resolved in n8n version 1.113.0, where the execution of untrusted Git hooks during the Commit operation is prevented.

Potential Impact

For European organizations, this vulnerability poses significant risks due to the increasing adoption of n8n for automating business processes and integrating various services. Exploitation could lead to full system compromise, unauthorized access to sensitive credentials stored or used within workflows, and disruption of critical automated operations. This could result in data breaches, operational downtime, and potential regulatory non-compliance under GDPR if personal data is exposed or manipulated. Cloud deployments are particularly at risk due to their exposure to external networks, while self-hosted instances may be targeted via insider threats or lateral movement within corporate networks. The ability to execute arbitrary code remotely without user interaction increases the attack surface and potential for automated exploitation campaigns. The impact extends beyond the compromised n8n instance to any connected systems or services integrated via workflows, amplifying the potential damage.

Mitigation Recommendations

European organizations should immediately upgrade all n8n instances to version 1.113.0 or later to remediate this vulnerability. Until patching is complete, restrict network access to the Git Node component and limit the ability to clone repositories from untrusted sources. Implement strict repository whitelisting and code review policies to prevent malicious Git hooks from entering the environment. Employ runtime application monitoring to detect anomalous process executions indicative of hook-triggered code execution. Use least privilege principles for n8n service accounts to minimize the impact of potential exploitation. Regularly audit workflows and connected credentials for unauthorized changes. Additionally, segregate n8n environments from critical infrastructure to contain potential breaches. Finally, maintain up-to-date backups of workflows and configurations to enable rapid recovery if compromise occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-10-20T19:41:22.742Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69039529aebfcd547481615c

Added to database: 10/30/2025, 4:41:13 PM

Last enriched: 10/30/2025, 4:55:47 PM

Last updated: 10/30/2025, 8:30:18 PM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats