Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68697: CWE-269: Improper Privilege Management in n8n-io n8n

0
High
VulnerabilityCVE-2025-68697cvecve-2025-68697cwe-269cwe-749
Published: Fri Dec 26 2025 (12/26/2025, 21:51:12 UTC)
Source: CVE Database V5
Vendor/Project: n8n-io
Product: n8n

Description

CVE-2025-68697 is a high-severity privilege management vulnerability in n8n versions prior to 2. 0. 0. It affects self-hosted n8n instances running the Code node in legacy JavaScript execution mode, allowing authenticated users with workflow editing rights to execute internal helper functions. This enables them to read and write files on the host system with the same privileges as the n8n process, potentially exposing sensitive data or modifying critical files. The vulnerability does not require user interaction beyond authentication and has a CVSS score of 7. 1. It has been patched in version 2. 0. 0, with recommended mitigations including restricting file access directories, blocking access to configuration files, and disabling high-risk nodes if editors are not fully trusted.

AI-Powered Analysis

AILast updated: 12/26/2025, 22:24:29 UTC

Technical Analysis

CVE-2025-68697 is a vulnerability classified under CWE-269 (Improper Privilege Management) and CWE-749 (Exposed Dangerous Method or Function) affecting the open-source workflow automation platform n8n prior to version 2.0.0. The issue arises in self-hosted n8n deployments where the Code node operates in legacy JavaScript execution mode (non-task-runner mode). Authenticated users who have workflow editing permissions can exploit this flaw by invoking internal helper functions from within the Code node. These helper functions provide access to the underlying host filesystem with the same privileges as the n8n process. Consequently, an attacker can read sensitive files or write arbitrary files to the host, constrained only by existing OS or container-level permissions and any configured file access restrictions within n8n. This can lead to unauthorized disclosure of sensitive information, potential tampering with configuration or operational files, and further escalation of privileges if critical files are overwritten. The vulnerability does not require additional user interaction beyond authentication and can be exploited remotely over the network. The vendor addressed this issue in n8n version 2.0.0 by changing the execution mode and restricting access. Workarounds include configuring environment variables such as N8N_RESTRICT_FILE_ACCESS_TO to limit accessible directories, enabling N8N_BLOCK_FILE_ACCESS_TO_N8N_FILES to block access to sensitive config files, and disabling risky nodes like the Code node via NODES_EXCLUDE if workflow editors are not fully trusted. No known exploits are reported in the wild as of the publication date.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for those deploying self-hosted n8n instances for automating business workflows. Exploitation can lead to unauthorized access to sensitive corporate data stored on the host system, including credentials, configuration files, or proprietary information. The ability to write files may allow attackers to implant malicious scripts or modify workflows, potentially disrupting business operations or enabling further lateral movement within the network. Given n8n’s role in automating critical processes, compromise could impact data integrity and operational continuity. Organizations in regulated sectors such as finance, healthcare, and government are particularly vulnerable due to strict data protection requirements under GDPR and other regulations. The vulnerability’s exploitation requires only authenticated access with workflow editing privileges, which may be obtained via compromised credentials or insider threats, increasing the attack surface. The lack of user interaction and remote network exploitability further heightens the risk. Failure to patch or mitigate this vulnerability could result in data breaches, compliance violations, reputational damage, and operational disruptions.

Mitigation Recommendations

European organizations should immediately upgrade all self-hosted n8n instances to version 2.0.0 or later to fully remediate this vulnerability. Until upgrades can be performed, implement the following mitigations: 1) Configure the environment variable N8N_RESTRICT_FILE_ACCESS_TO to restrict file operations to a dedicated directory that contains no sensitive data, minimizing the risk of unauthorized file access. 2) Ensure N8N_BLOCK_FILE_ACCESS_TO_N8N_FILES is set to true (default) to block access to the .n8n directory and user-defined configuration files, protecting critical configuration data. 3) Disable the Code node and other high-risk nodes using the NODES_EXCLUDE environment variable if workflow editors are not fully trusted, thereby reducing the attack surface. 4) Enforce strict access controls and monitor workflow editor accounts for suspicious activity to prevent unauthorized privilege escalation. 5) Employ network segmentation and host-level security controls to limit the impact of any potential compromise. 6) Regularly audit and review workflow permissions and user roles to ensure least privilege principles are maintained. 7) Implement logging and alerting on file access and workflow changes to detect exploitation attempts promptly.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-12-23T17:11:35.076Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 694f079233784cecd499b7fb

Added to database: 12/26/2025, 10:09:22 PM

Last enriched: 12/26/2025, 10:24:29 PM

Last updated: 12/27/2025, 1:09:01 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats