CVE-2026-25049: CWE-913: Improper Control of Dynamically-Managed Code Resources in n8n-io n8n
CVE-2026-25049 is a critical vulnerability in the n8n workflow automation platform affecting versions prior to 1. 123. 17 and 2. 5. 2. Authenticated users with permissions to create or modify workflows can exploit crafted expressions in workflow parameters to execute arbitrary system commands on the host running n8n. This vulnerability arises from improper control of dynamically-managed code resources (CWE-913). No user interaction is required beyond authentication, and the exploit can lead to full system compromise. The issue has been patched in the specified versions. Although no known exploits are currently reported in the wild, the high CVSS score of 9.
AI Analysis
Technical Summary
CVE-2026-25049 is a critical security vulnerability identified in the open-source workflow automation platform n8n, specifically affecting versions prior to 1.123.17 and 2.5.2. The root cause is classified under CWE-913, which involves improper control of dynamically-managed code resources. In this case, an authenticated user with workflow creation or modification permissions can inject malicious expressions into workflow parameters. These crafted expressions are improperly sanitized or validated, allowing them to trigger unintended system command execution on the host machine running the n8n service. This means that an attacker who gains legitimate access to n8n with sufficient privileges can escalate their control to execute arbitrary commands at the system level, potentially leading to full compromise of the underlying server. The vulnerability does not require additional user interaction beyond authentication, and the attack vector is network-based, making remote exploitation feasible. The CVSS 4.0 base score of 9.4 reflects the critical nature of this flaw, highlighting its high impact on confidentiality, integrity, and availability, combined with low attack complexity and no need for user interaction. Although no known exploits have been reported in the wild yet, the availability of this information and the severity of the vulnerability necessitate immediate remediation. The vendor has addressed the issue in versions 1.123.17 and 2.5.2 by implementing proper controls to prevent malicious expression injection and command execution. Organizations running vulnerable versions of n8n should upgrade promptly to mitigate risk. Given n8n’s role in automating workflows, exploitation could disrupt business processes, leak sensitive data, or allow lateral movement within networks.
Potential Impact
For European organizations, the impact of CVE-2026-25049 can be substantial. n8n is used to automate complex workflows that often integrate multiple systems and services, including sensitive business applications and data sources. Exploitation could lead to unauthorized command execution on servers hosting n8n, resulting in data breaches, service disruption, or full system compromise. This could affect confidentiality by exposing sensitive data processed in workflows, integrity by altering or sabotaging automated processes, and availability by causing service outages. The ability for an authenticated user to escalate privileges and execute arbitrary commands increases the risk of lateral movement and persistence within enterprise networks. Critical sectors such as finance, manufacturing, healthcare, and government agencies that rely on automation tools for operational efficiency are particularly at risk. The disruption or compromise of automated workflows could have cascading effects on business continuity and regulatory compliance, especially under GDPR and other data protection frameworks prevalent in Europe.
Mitigation Recommendations
European organizations should take the following specific actions to mitigate this vulnerability: 1) Immediately upgrade all n8n instances to version 1.123.17 or 2.5.2 or later, where the vulnerability is patched. 2) Restrict workflow creation and modification permissions to trusted administrators only, minimizing the number of users who can exploit this flaw. 3) Implement network segmentation and access controls to limit exposure of n8n servers to only necessary internal users and systems. 4) Monitor logs and workflow changes for unusual or unauthorized activity that could indicate exploitation attempts. 5) Employ application-level firewalls or runtime application self-protection (RASP) solutions to detect and block suspicious command execution patterns. 6) Conduct regular security audits and penetration testing focusing on workflow automation platforms to identify similar injection or execution risks. 7) Educate administrators and developers on secure workflow design and the risks of dynamic expression injection. 8) Consider deploying n8n instances within hardened containers or virtual machines with strict privilege separation to limit impact if exploited.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2026-25049: CWE-913: Improper Control of Dynamically-Managed Code Resources in n8n-io n8n
Description
CVE-2026-25049 is a critical vulnerability in the n8n workflow automation platform affecting versions prior to 1. 123. 17 and 2. 5. 2. Authenticated users with permissions to create or modify workflows can exploit crafted expressions in workflow parameters to execute arbitrary system commands on the host running n8n. This vulnerability arises from improper control of dynamically-managed code resources (CWE-913). No user interaction is required beyond authentication, and the exploit can lead to full system compromise. The issue has been patched in the specified versions. Although no known exploits are currently reported in the wild, the high CVSS score of 9.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-25049 is a critical security vulnerability identified in the open-source workflow automation platform n8n, specifically affecting versions prior to 1.123.17 and 2.5.2. The root cause is classified under CWE-913, which involves improper control of dynamically-managed code resources. In this case, an authenticated user with workflow creation or modification permissions can inject malicious expressions into workflow parameters. These crafted expressions are improperly sanitized or validated, allowing them to trigger unintended system command execution on the host machine running the n8n service. This means that an attacker who gains legitimate access to n8n with sufficient privileges can escalate their control to execute arbitrary commands at the system level, potentially leading to full compromise of the underlying server. The vulnerability does not require additional user interaction beyond authentication, and the attack vector is network-based, making remote exploitation feasible. The CVSS 4.0 base score of 9.4 reflects the critical nature of this flaw, highlighting its high impact on confidentiality, integrity, and availability, combined with low attack complexity and no need for user interaction. Although no known exploits have been reported in the wild yet, the availability of this information and the severity of the vulnerability necessitate immediate remediation. The vendor has addressed the issue in versions 1.123.17 and 2.5.2 by implementing proper controls to prevent malicious expression injection and command execution. Organizations running vulnerable versions of n8n should upgrade promptly to mitigate risk. Given n8n’s role in automating workflows, exploitation could disrupt business processes, leak sensitive data, or allow lateral movement within networks.
Potential Impact
For European organizations, the impact of CVE-2026-25049 can be substantial. n8n is used to automate complex workflows that often integrate multiple systems and services, including sensitive business applications and data sources. Exploitation could lead to unauthorized command execution on servers hosting n8n, resulting in data breaches, service disruption, or full system compromise. This could affect confidentiality by exposing sensitive data processed in workflows, integrity by altering or sabotaging automated processes, and availability by causing service outages. The ability for an authenticated user to escalate privileges and execute arbitrary commands increases the risk of lateral movement and persistence within enterprise networks. Critical sectors such as finance, manufacturing, healthcare, and government agencies that rely on automation tools for operational efficiency are particularly at risk. The disruption or compromise of automated workflows could have cascading effects on business continuity and regulatory compliance, especially under GDPR and other data protection frameworks prevalent in Europe.
Mitigation Recommendations
European organizations should take the following specific actions to mitigate this vulnerability: 1) Immediately upgrade all n8n instances to version 1.123.17 or 2.5.2 or later, where the vulnerability is patched. 2) Restrict workflow creation and modification permissions to trusted administrators only, minimizing the number of users who can exploit this flaw. 3) Implement network segmentation and access controls to limit exposure of n8n servers to only necessary internal users and systems. 4) Monitor logs and workflow changes for unusual or unauthorized activity that could indicate exploitation attempts. 5) Employ application-level firewalls or runtime application self-protection (RASP) solutions to detect and block suspicious command execution patterns. 6) Conduct regular security audits and penetration testing focusing on workflow automation platforms to identify similar injection or execution risks. 7) Educate administrators and developers on secure workflow design and the risks of dynamic expression injection. 8) Consider deploying n8n instances within hardened containers or virtual machines with strict privilege separation to limit impact if exploited.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-28T14:50:47.888Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69837ea2f9fa50a62f9d1908
Added to database: 2/4/2026, 5:15:14 PM
Last enriched: 2/12/2026, 7:40:15 AM
Last updated: 3/22/2026, 5:20:28 PM
Views: 504
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.