CVE-2025-62726: CWE-829: Inclusion of Functionality from Untrusted Control Sphere in n8n-io n8n
CVE-2025-62726 is a high-severity remote code execution vulnerability in n8n versions prior to 1. 113. 0 affecting the Git Node component. The flaw arises when a malicious actor clones a remote Git repository containing a crafted pre-commit hook; using the Commit operation in n8n’s Git Node triggers execution of this hook, allowing arbitrary code execution within the n8n environment. This compromises system integrity, confidentiality of connected credentials, and availability of workflows. The vulnerability requires at least limited privileges (PR:L) but no user interaction and can be exploited remotely. It affects both Cloud and Self-Hosted deployments of n8n. No known exploits are reported in the wild yet. The issue is fixed in version 1. 113.
AI Analysis
Technical Summary
CVE-2025-62726 is a remote code execution vulnerability identified in the open-source workflow automation platform n8n, specifically in its Git Node component available in both Cloud and Self-Hosted versions prior to version 1.113.0. The vulnerability stems from the inclusion of functionality from an untrusted control sphere (CWE-829). When n8n clones a remote Git repository that contains a maliciously crafted pre-commit hook, the subsequent use of the Commit operation in the Git Node inadvertently triggers execution of this hook. This behavior allows an attacker to execute arbitrary code within the n8n runtime environment. The attack vector requires network access and limited privileges (PR:L), but no user interaction is necessary, making exploitation feasible in automated or unattended scenarios. The impact is severe, affecting confidentiality, integrity, and availability: attackers can compromise the system, access or manipulate connected credentials, and disrupt workflows. The vulnerability has a CVSS v3.1 base score of 8.8, reflecting its high severity. Although no known exploits have been reported in the wild, the nature of the vulnerability and the widespread use of n8n in automation workflows make it a critical risk. The issue is resolved in n8n version 1.113.0, where the execution of untrusted Git hooks during the Commit operation is prevented.
Potential Impact
For European organizations, this vulnerability poses significant risks due to the increasing adoption of n8n for automating business processes and integrating various services. Exploitation could lead to full system compromise, unauthorized access to sensitive credentials stored or used within workflows, and disruption of critical automated operations. This could result in data breaches, operational downtime, and potential regulatory non-compliance under GDPR if personal data is exposed or manipulated. Cloud deployments are particularly at risk due to their exposure to external networks, while self-hosted instances may be targeted via insider threats or lateral movement within corporate networks. The ability to execute arbitrary code remotely without user interaction increases the attack surface and potential for automated exploitation campaigns. The impact extends beyond the compromised n8n instance to any connected systems or services integrated via workflows, amplifying the potential damage.
Mitigation Recommendations
European organizations should immediately upgrade all n8n instances to version 1.113.0 or later to remediate this vulnerability. Until patching is complete, restrict network access to the Git Node component and limit the ability to clone repositories from untrusted sources. Implement strict repository whitelisting and code review policies to prevent malicious Git hooks from entering the environment. Employ runtime application monitoring to detect anomalous process executions indicative of hook-triggered code execution. Use least privilege principles for n8n service accounts to minimize the impact of potential exploitation. Regularly audit workflows and connected credentials for unauthorized changes. Additionally, segregate n8n environments from critical infrastructure to contain potential breaches. Finally, maintain up-to-date backups of workflows and configurations to enable rapid recovery if compromise occurs.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-62726: CWE-829: Inclusion of Functionality from Untrusted Control Sphere in n8n-io n8n
Description
CVE-2025-62726 is a high-severity remote code execution vulnerability in n8n versions prior to 1. 113. 0 affecting the Git Node component. The flaw arises when a malicious actor clones a remote Git repository containing a crafted pre-commit hook; using the Commit operation in n8n’s Git Node triggers execution of this hook, allowing arbitrary code execution within the n8n environment. This compromises system integrity, confidentiality of connected credentials, and availability of workflows. The vulnerability requires at least limited privileges (PR:L) but no user interaction and can be exploited remotely. It affects both Cloud and Self-Hosted deployments of n8n. No known exploits are reported in the wild yet. The issue is fixed in version 1. 113.
AI-Powered Analysis
Technical Analysis
CVE-2025-62726 is a remote code execution vulnerability identified in the open-source workflow automation platform n8n, specifically in its Git Node component available in both Cloud and Self-Hosted versions prior to version 1.113.0. The vulnerability stems from the inclusion of functionality from an untrusted control sphere (CWE-829). When n8n clones a remote Git repository that contains a maliciously crafted pre-commit hook, the subsequent use of the Commit operation in the Git Node inadvertently triggers execution of this hook. This behavior allows an attacker to execute arbitrary code within the n8n runtime environment. The attack vector requires network access and limited privileges (PR:L), but no user interaction is necessary, making exploitation feasible in automated or unattended scenarios. The impact is severe, affecting confidentiality, integrity, and availability: attackers can compromise the system, access or manipulate connected credentials, and disrupt workflows. The vulnerability has a CVSS v3.1 base score of 8.8, reflecting its high severity. Although no known exploits have been reported in the wild, the nature of the vulnerability and the widespread use of n8n in automation workflows make it a critical risk. The issue is resolved in n8n version 1.113.0, where the execution of untrusted Git hooks during the Commit operation is prevented.
Potential Impact
For European organizations, this vulnerability poses significant risks due to the increasing adoption of n8n for automating business processes and integrating various services. Exploitation could lead to full system compromise, unauthorized access to sensitive credentials stored or used within workflows, and disruption of critical automated operations. This could result in data breaches, operational downtime, and potential regulatory non-compliance under GDPR if personal data is exposed or manipulated. Cloud deployments are particularly at risk due to their exposure to external networks, while self-hosted instances may be targeted via insider threats or lateral movement within corporate networks. The ability to execute arbitrary code remotely without user interaction increases the attack surface and potential for automated exploitation campaigns. The impact extends beyond the compromised n8n instance to any connected systems or services integrated via workflows, amplifying the potential damage.
Mitigation Recommendations
European organizations should immediately upgrade all n8n instances to version 1.113.0 or later to remediate this vulnerability. Until patching is complete, restrict network access to the Git Node component and limit the ability to clone repositories from untrusted sources. Implement strict repository whitelisting and code review policies to prevent malicious Git hooks from entering the environment. Employ runtime application monitoring to detect anomalous process executions indicative of hook-triggered code execution. Use least privilege principles for n8n service accounts to minimize the impact of potential exploitation. Regularly audit workflows and connected credentials for unauthorized changes. Additionally, segregate n8n environments from critical infrastructure to contain potential breaches. Finally, maintain up-to-date backups of workflows and configurations to enable rapid recovery if compromise occurs.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-10-20T19:41:22.742Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69039529aebfcd547481615c
Added to database: 10/30/2025, 4:41:13 PM
Last enriched: 10/30/2025, 4:55:47 PM
Last updated: 10/30/2025, 8:30:18 PM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-8850: CWE-440 Expected Behavior Violation in danny-avila danny-avila/librechat
LowCVE-2025-63423: n/a
HighCVE-2025-3356: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in IBM Tivoli Monitoring
HighCVE-2025-3355: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in IBM Tivoli Monitoring
HighCVE-2025-63422: n/a
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.