CVE-2025-68697: CWE-269: Improper Privilege Management in n8n-io n8n
CVE-2025-68697 is a high-severity privilege management vulnerability in n8n versions prior to 2. 0. 0. It affects self-hosted n8n instances running the Code node in legacy JavaScript execution mode, allowing authenticated users with workflow editing rights to execute internal helper functions. This enables them to read and write files on the host system with the same privileges as the n8n process, potentially exposing sensitive data or modifying critical files. The vulnerability does not require user interaction beyond authentication and has a CVSS score of 7. 1. It has been patched in version 2. 0. 0, with recommended mitigations including restricting file access directories, blocking access to configuration files, and disabling high-risk nodes if editors are not fully trusted.
AI Analysis
Technical Summary
CVE-2025-68697 is a vulnerability classified under CWE-269 (Improper Privilege Management) and CWE-749 (Exposed Dangerous Method or Function) affecting the open-source workflow automation platform n8n prior to version 2.0.0. The issue arises in self-hosted n8n deployments where the Code node operates in legacy JavaScript execution mode (non-task-runner mode). Authenticated users who have workflow editing permissions can exploit this flaw by invoking internal helper functions from within the Code node. These helper functions provide access to the underlying host filesystem with the same privileges as the n8n process. Consequently, an attacker can read sensitive files or write arbitrary files to the host, constrained only by existing OS or container-level permissions and any configured file access restrictions within n8n. This can lead to unauthorized disclosure of sensitive information, potential tampering with configuration or operational files, and further escalation of privileges if critical files are overwritten. The vulnerability does not require additional user interaction beyond authentication and can be exploited remotely over the network. The vendor addressed this issue in n8n version 2.0.0 by changing the execution mode and restricting access. Workarounds include configuring environment variables such as N8N_RESTRICT_FILE_ACCESS_TO to limit accessible directories, enabling N8N_BLOCK_FILE_ACCESS_TO_N8N_FILES to block access to sensitive config files, and disabling risky nodes like the Code node via NODES_EXCLUDE if workflow editors are not fully trusted. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those deploying self-hosted n8n instances for automating business workflows. Exploitation can lead to unauthorized access to sensitive corporate data stored on the host system, including credentials, configuration files, or proprietary information. The ability to write files may allow attackers to implant malicious scripts or modify workflows, potentially disrupting business operations or enabling further lateral movement within the network. Given n8n’s role in automating critical processes, compromise could impact data integrity and operational continuity. Organizations in regulated sectors such as finance, healthcare, and government are particularly vulnerable due to strict data protection requirements under GDPR and other regulations. The vulnerability’s exploitation requires only authenticated access with workflow editing privileges, which may be obtained via compromised credentials or insider threats, increasing the attack surface. The lack of user interaction and remote network exploitability further heightens the risk. Failure to patch or mitigate this vulnerability could result in data breaches, compliance violations, reputational damage, and operational disruptions.
Mitigation Recommendations
European organizations should immediately upgrade all self-hosted n8n instances to version 2.0.0 or later to fully remediate this vulnerability. Until upgrades can be performed, implement the following mitigations: 1) Configure the environment variable N8N_RESTRICT_FILE_ACCESS_TO to restrict file operations to a dedicated directory that contains no sensitive data, minimizing the risk of unauthorized file access. 2) Ensure N8N_BLOCK_FILE_ACCESS_TO_N8N_FILES is set to true (default) to block access to the .n8n directory and user-defined configuration files, protecting critical configuration data. 3) Disable the Code node and other high-risk nodes using the NODES_EXCLUDE environment variable if workflow editors are not fully trusted, thereby reducing the attack surface. 4) Enforce strict access controls and monitor workflow editor accounts for suspicious activity to prevent unauthorized privilege escalation. 5) Employ network segmentation and host-level security controls to limit the impact of any potential compromise. 6) Regularly audit and review workflow permissions and user roles to ensure least privilege principles are maintained. 7) Implement logging and alerting on file access and workflow changes to detect exploitation attempts promptly.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Poland
CVE-2025-68697: CWE-269: Improper Privilege Management in n8n-io n8n
Description
CVE-2025-68697 is a high-severity privilege management vulnerability in n8n versions prior to 2. 0. 0. It affects self-hosted n8n instances running the Code node in legacy JavaScript execution mode, allowing authenticated users with workflow editing rights to execute internal helper functions. This enables them to read and write files on the host system with the same privileges as the n8n process, potentially exposing sensitive data or modifying critical files. The vulnerability does not require user interaction beyond authentication and has a CVSS score of 7. 1. It has been patched in version 2. 0. 0, with recommended mitigations including restricting file access directories, blocking access to configuration files, and disabling high-risk nodes if editors are not fully trusted.
AI-Powered Analysis
Technical Analysis
CVE-2025-68697 is a vulnerability classified under CWE-269 (Improper Privilege Management) and CWE-749 (Exposed Dangerous Method or Function) affecting the open-source workflow automation platform n8n prior to version 2.0.0. The issue arises in self-hosted n8n deployments where the Code node operates in legacy JavaScript execution mode (non-task-runner mode). Authenticated users who have workflow editing permissions can exploit this flaw by invoking internal helper functions from within the Code node. These helper functions provide access to the underlying host filesystem with the same privileges as the n8n process. Consequently, an attacker can read sensitive files or write arbitrary files to the host, constrained only by existing OS or container-level permissions and any configured file access restrictions within n8n. This can lead to unauthorized disclosure of sensitive information, potential tampering with configuration or operational files, and further escalation of privileges if critical files are overwritten. The vulnerability does not require additional user interaction beyond authentication and can be exploited remotely over the network. The vendor addressed this issue in n8n version 2.0.0 by changing the execution mode and restricting access. Workarounds include configuring environment variables such as N8N_RESTRICT_FILE_ACCESS_TO to limit accessible directories, enabling N8N_BLOCK_FILE_ACCESS_TO_N8N_FILES to block access to sensitive config files, and disabling risky nodes like the Code node via NODES_EXCLUDE if workflow editors are not fully trusted. No known exploits are reported in the wild as of the publication date.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for those deploying self-hosted n8n instances for automating business workflows. Exploitation can lead to unauthorized access to sensitive corporate data stored on the host system, including credentials, configuration files, or proprietary information. The ability to write files may allow attackers to implant malicious scripts or modify workflows, potentially disrupting business operations or enabling further lateral movement within the network. Given n8n’s role in automating critical processes, compromise could impact data integrity and operational continuity. Organizations in regulated sectors such as finance, healthcare, and government are particularly vulnerable due to strict data protection requirements under GDPR and other regulations. The vulnerability’s exploitation requires only authenticated access with workflow editing privileges, which may be obtained via compromised credentials or insider threats, increasing the attack surface. The lack of user interaction and remote network exploitability further heightens the risk. Failure to patch or mitigate this vulnerability could result in data breaches, compliance violations, reputational damage, and operational disruptions.
Mitigation Recommendations
European organizations should immediately upgrade all self-hosted n8n instances to version 2.0.0 or later to fully remediate this vulnerability. Until upgrades can be performed, implement the following mitigations: 1) Configure the environment variable N8N_RESTRICT_FILE_ACCESS_TO to restrict file operations to a dedicated directory that contains no sensitive data, minimizing the risk of unauthorized file access. 2) Ensure N8N_BLOCK_FILE_ACCESS_TO_N8N_FILES is set to true (default) to block access to the .n8n directory and user-defined configuration files, protecting critical configuration data. 3) Disable the Code node and other high-risk nodes using the NODES_EXCLUDE environment variable if workflow editors are not fully trusted, thereby reducing the attack surface. 4) Enforce strict access controls and monitor workflow editor accounts for suspicious activity to prevent unauthorized privilege escalation. 5) Employ network segmentation and host-level security controls to limit the impact of any potential compromise. 6) Regularly audit and review workflow permissions and user roles to ensure least privilege principles are maintained. 7) Implement logging and alerting on file access and workflow changes to detect exploitation attempts promptly.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2025-12-23T17:11:35.076Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 694f079233784cecd499b7fb
Added to database: 12/26/2025, 10:09:22 PM
Last enriched: 12/26/2025, 10:24:29 PM
Last updated: 12/27/2025, 1:09:01 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-68474: CWE-787: Out-of-bounds Write in espressif esp-idf
MediumCVE-2025-66203: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in lemon8866 StreamVault
CriticalCVE-2025-64481: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in simonw datasette
LowCVE-2025-67729: CWE-502: Deserialization of Untrusted Data in InternLM lmdeploy
HighCVE-2025-68668: CWE-693: Protection Mechanism Failure in n8n-io n8n
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.