Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25049: CWE-913: Improper Control of Dynamically-Managed Code Resources in n8n-io n8n

0
Critical
VulnerabilityCVE-2026-25049cvecve-2026-25049cwe-913
Published: Wed Feb 04 2026 (02/04/2026, 16:46:31 UTC)
Source: CVE Database V5
Vendor/Project: n8n-io
Product: n8n

Description

CVE-2026-25049 is a critical vulnerability in the n8n workflow automation platform affecting versions prior to 1. 123. 17 and 2. 5. 2. Authenticated users with permissions to create or modify workflows can exploit crafted expressions in workflow parameters to execute arbitrary system commands on the host running n8n. This vulnerability arises from improper control of dynamically-managed code resources (CWE-913). No user interaction is required beyond authentication, and the exploit can lead to full system compromise. The issue has been patched in the specified versions. Although no known exploits are currently reported in the wild, the high CVSS score of 9.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 07:40:15 UTC

Technical Analysis

CVE-2026-25049 is a critical security vulnerability identified in the open-source workflow automation platform n8n, specifically affecting versions prior to 1.123.17 and 2.5.2. The root cause is classified under CWE-913, which involves improper control of dynamically-managed code resources. In this case, an authenticated user with workflow creation or modification permissions can inject malicious expressions into workflow parameters. These crafted expressions are improperly sanitized or validated, allowing them to trigger unintended system command execution on the host machine running the n8n service. This means that an attacker who gains legitimate access to n8n with sufficient privileges can escalate their control to execute arbitrary commands at the system level, potentially leading to full compromise of the underlying server. The vulnerability does not require additional user interaction beyond authentication, and the attack vector is network-based, making remote exploitation feasible. The CVSS 4.0 base score of 9.4 reflects the critical nature of this flaw, highlighting its high impact on confidentiality, integrity, and availability, combined with low attack complexity and no need for user interaction. Although no known exploits have been reported in the wild yet, the availability of this information and the severity of the vulnerability necessitate immediate remediation. The vendor has addressed the issue in versions 1.123.17 and 2.5.2 by implementing proper controls to prevent malicious expression injection and command execution. Organizations running vulnerable versions of n8n should upgrade promptly to mitigate risk. Given n8n’s role in automating workflows, exploitation could disrupt business processes, leak sensitive data, or allow lateral movement within networks.

Potential Impact

For European organizations, the impact of CVE-2026-25049 can be substantial. n8n is used to automate complex workflows that often integrate multiple systems and services, including sensitive business applications and data sources. Exploitation could lead to unauthorized command execution on servers hosting n8n, resulting in data breaches, service disruption, or full system compromise. This could affect confidentiality by exposing sensitive data processed in workflows, integrity by altering or sabotaging automated processes, and availability by causing service outages. The ability for an authenticated user to escalate privileges and execute arbitrary commands increases the risk of lateral movement and persistence within enterprise networks. Critical sectors such as finance, manufacturing, healthcare, and government agencies that rely on automation tools for operational efficiency are particularly at risk. The disruption or compromise of automated workflows could have cascading effects on business continuity and regulatory compliance, especially under GDPR and other data protection frameworks prevalent in Europe.

Mitigation Recommendations

European organizations should take the following specific actions to mitigate this vulnerability: 1) Immediately upgrade all n8n instances to version 1.123.17 or 2.5.2 or later, where the vulnerability is patched. 2) Restrict workflow creation and modification permissions to trusted administrators only, minimizing the number of users who can exploit this flaw. 3) Implement network segmentation and access controls to limit exposure of n8n servers to only necessary internal users and systems. 4) Monitor logs and workflow changes for unusual or unauthorized activity that could indicate exploitation attempts. 5) Employ application-level firewalls or runtime application self-protection (RASP) solutions to detect and block suspicious command execution patterns. 6) Conduct regular security audits and penetration testing focusing on workflow automation platforms to identify similar injection or execution risks. 7) Educate administrators and developers on secure workflow design and the risks of dynamic expression injection. 8) Consider deploying n8n instances within hardened containers or virtual machines with strict privilege separation to limit impact if exploited.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-28T14:50:47.888Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69837ea2f9fa50a62f9d1908

Added to database: 2/4/2026, 5:15:14 PM

Last enriched: 2/12/2026, 7:40:15 AM

Last updated: 3/22/2026, 5:20:28 PM

Views: 504

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses