Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-65964: CWE-829: Inclusion of Functionality from Untrusted Control Sphere in n8n-io n8n

0
Critical
VulnerabilityCVE-2025-65964cvecve-2025-65964cwe-829
Published: Mon Dec 08 2025 (12/08/2025, 23:35:02 UTC)
Source: CVE Database V5
Vendor/Project: n8n-io
Product: n8n

Description

n8n is an open source workflow automation platform. Versions 0.123.1 through 1.119.1 do not have adequate protections to prevent RCE through the project's pre-commit hooks. The Add Config operation allows workflows to set arbitrary Git configuration values, including core.hooksPath, which can point to a malicious Git hook that executes arbitrary commands on the n8n host during subsequent Git operations. Exploitation requires the ability to create or modify an n8n workflow using the Git node. This issue is fixed in version 1.119.2. Workarounds include excluding the Git Node (Docs) and avoiding cloning or interacting with untrusted repositories using the Git Node.

AI-Powered Analysis

AILast updated: 12/16/2025, 06:01:45 UTC

Technical Analysis

CVE-2025-65964 is a critical vulnerability in the n8n open source workflow automation platform affecting versions from 0.123.1 up to 1.119.1. The vulnerability stems from the Git node's Add Config operation, which allows workflows to set arbitrary Git configuration parameters, including core.hooksPath. This configuration controls the directory from which Git loads hooks, scripts that run automatically during Git operations. By setting core.hooksPath to a directory containing malicious hooks, an attacker who can create or modify workflows with the Git node can cause arbitrary commands to execute on the n8n host during subsequent Git operations, leading to remote code execution (RCE). The attack vector requires the ability to modify workflows but does not require user interaction or elevated privileges beyond workflow modification rights. The vulnerability is classified under CWE-829 (Inclusion of Functionality from Untrusted Control Sphere), indicating that untrusted input controls execution flow. The CVSS 4.0 base score is 9.4 (critical), reflecting network attack vector, low attack complexity, no privileges or user interaction required, and high impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported yet. The issue was fixed in n8n version 1.119.2. Workarounds include disabling the Git node entirely and avoiding cloning or interacting with untrusted repositories via the Git node. This vulnerability poses a significant risk to organizations using n8n for workflow automation, especially those integrating Git-based workflows or automations.

Potential Impact

For European organizations, exploitation of CVE-2025-65964 could lead to full system compromise of the n8n host, allowing attackers to execute arbitrary commands, potentially leading to data theft, lateral movement, or disruption of automated workflows. Given n8n's role in automating business processes, an attacker could manipulate or disrupt critical operations, causing operational downtime and reputational damage. The vulnerability's network accessibility and lack of required user interaction increase the risk of remote exploitation, especially in environments where multiple users can create or modify workflows. Organizations relying on n8n to integrate with Git repositories or automate DevOps pipelines are particularly at risk. The impact is exacerbated in regulated industries common in Europe, such as finance, healthcare, and manufacturing, where workflow integrity and data confidentiality are paramount. Additionally, supply chain attacks could be facilitated by injecting malicious hooks into workflows that interact with external repositories. The absence of known exploits in the wild suggests a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

The primary mitigation is to upgrade n8n to version 1.119.2 or later, where the vulnerability is fixed. Until upgrade is possible, organizations should disable or restrict the Git node functionality to prevent workflows from modifying Git configurations. Implement strict access controls to limit who can create or modify workflows, ensuring only trusted users have such permissions. Avoid cloning or interacting with untrusted Git repositories through the Git node to reduce exposure to malicious hooks. Monitor workflow changes and Git operations for unusual activity indicative of exploitation attempts. Employ network segmentation to isolate n8n hosts from critical infrastructure and sensitive data stores. Conduct regular security audits of workflow configurations and Git integration settings. Finally, educate DevOps and automation teams about the risks of untrusted code execution via Git hooks and enforce policies to validate all external code sources.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-18T16:14:56.694Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693763792bceb4b25b4513af

Added to database: 12/8/2025, 11:47:05 PM

Last enriched: 12/16/2025, 6:01:45 AM

Last updated: 2/7/2026, 2:49:54 PM

Views: 748

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats