CVE-2026-25051: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in n8n-io n8n
CVE-2026-25051 is a high-severity Cross-Site Scripting (XSS) vulnerability in the open-source workflow automation platform n8n prior to version 1. 123. 2. It arises from improper input neutralization in webhook responses and related HTTP endpoints, where the Content Security Policy sandbox is sometimes not correctly applied. An authenticated user with workflow creation or modification permissions can exploit this to execute malicious scripts with same-origin privileges when other users interact with the crafted workflow. This can lead to session hijacking and account takeover. The vulnerability requires authenticated access and some user interaction but does not require elevated privileges beyond workflow modification rights. No known exploits are currently reported in the wild. The issue has been patched in version 1. 123.
AI Analysis
Technical Summary
CVE-2026-25051 is a Cross-Site Scripting (XSS) vulnerability classified under CWE-79 affecting n8n, an open-source workflow automation platform. The vulnerability exists in versions prior to 1.123.2 and is due to improper neutralization of input during web page generation, specifically in the handling of webhook responses and related HTTP endpoints. Under certain conditions, the Content Security Policy (CSP) sandbox, which is intended to isolate HTML responses and prevent script execution, is not correctly enforced. This flaw allows an authenticated user with permission to create or modify workflows to inject malicious scripts into the workflow's HTTP responses. When other users interact with these crafted workflows, the malicious scripts execute with same-origin privileges, enabling session hijacking, credential theft, or account takeover. The vulnerability requires the attacker to have at least workflow modification rights and some user interaction to trigger the payload. The CVSS 4.0 base score is 8.5, reflecting high severity due to network attack vector, low attack complexity, no need for elevated privileges beyond workflow modification, and high impact on confidentiality and integrity. The vulnerability has been addressed in n8n version 1.123.2 by correcting the CSP enforcement and input sanitization mechanisms. No known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations using n8n for workflow automation, this vulnerability poses a significant risk. An attacker with authenticated access to workflow creation or modification can embed malicious scripts that execute in the context of other users' browsers, potentially leading to session hijacking and unauthorized account access. This can compromise sensitive business processes automated via n8n, leading to data breaches, disruption of automated workflows, and potential lateral movement within the network. Given n8n's use in automating critical business functions, exploitation could impact operational integrity and confidentiality. The requirement for authenticated access limits exposure to insider threats or compromised accounts, but the risk remains substantial in environments with multiple users having workflow modification permissions. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure. Organizations failing to update to the patched version remain vulnerable to targeted attacks that could lead to significant data loss or operational disruption.
Mitigation Recommendations
European organizations should prioritize upgrading n8n installations to version 1.123.2 or later, where the vulnerability is patched. Access controls should be reviewed and tightened to limit workflow creation and modification permissions to trusted users only. Implementing multi-factor authentication (MFA) for all users with elevated permissions can reduce the risk of account compromise. Monitoring and logging of workflow changes and webhook activity should be enhanced to detect suspicious modifications or unusual HTTP responses. Additionally, organizations should educate users about the risks of interacting with untrusted workflows and consider isolating n8n instances within segmented network zones to limit potential lateral movement. Employing web application firewalls (WAFs) with rules to detect and block reflected XSS payloads in HTTP responses may provide an additional layer of defense. Finally, regular security assessments and penetration testing focused on workflow automation platforms can help identify and remediate similar vulnerabilities proactively.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2026-25051: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in n8n-io n8n
Description
CVE-2026-25051 is a high-severity Cross-Site Scripting (XSS) vulnerability in the open-source workflow automation platform n8n prior to version 1. 123. 2. It arises from improper input neutralization in webhook responses and related HTTP endpoints, where the Content Security Policy sandbox is sometimes not correctly applied. An authenticated user with workflow creation or modification permissions can exploit this to execute malicious scripts with same-origin privileges when other users interact with the crafted workflow. This can lead to session hijacking and account takeover. The vulnerability requires authenticated access and some user interaction but does not require elevated privileges beyond workflow modification rights. No known exploits are currently reported in the wild. The issue has been patched in version 1. 123.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-25051 is a Cross-Site Scripting (XSS) vulnerability classified under CWE-79 affecting n8n, an open-source workflow automation platform. The vulnerability exists in versions prior to 1.123.2 and is due to improper neutralization of input during web page generation, specifically in the handling of webhook responses and related HTTP endpoints. Under certain conditions, the Content Security Policy (CSP) sandbox, which is intended to isolate HTML responses and prevent script execution, is not correctly enforced. This flaw allows an authenticated user with permission to create or modify workflows to inject malicious scripts into the workflow's HTTP responses. When other users interact with these crafted workflows, the malicious scripts execute with same-origin privileges, enabling session hijacking, credential theft, or account takeover. The vulnerability requires the attacker to have at least workflow modification rights and some user interaction to trigger the payload. The CVSS 4.0 base score is 8.5, reflecting high severity due to network attack vector, low attack complexity, no need for elevated privileges beyond workflow modification, and high impact on confidentiality and integrity. The vulnerability has been addressed in n8n version 1.123.2 by correcting the CSP enforcement and input sanitization mechanisms. No known exploits have been reported in the wild as of the publication date.
Potential Impact
For European organizations using n8n for workflow automation, this vulnerability poses a significant risk. An attacker with authenticated access to workflow creation or modification can embed malicious scripts that execute in the context of other users' browsers, potentially leading to session hijacking and unauthorized account access. This can compromise sensitive business processes automated via n8n, leading to data breaches, disruption of automated workflows, and potential lateral movement within the network. Given n8n's use in automating critical business functions, exploitation could impact operational integrity and confidentiality. The requirement for authenticated access limits exposure to insider threats or compromised accounts, but the risk remains substantial in environments with multiple users having workflow modification permissions. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure. Organizations failing to update to the patched version remain vulnerable to targeted attacks that could lead to significant data loss or operational disruption.
Mitigation Recommendations
European organizations should prioritize upgrading n8n installations to version 1.123.2 or later, where the vulnerability is patched. Access controls should be reviewed and tightened to limit workflow creation and modification permissions to trusted users only. Implementing multi-factor authentication (MFA) for all users with elevated permissions can reduce the risk of account compromise. Monitoring and logging of workflow changes and webhook activity should be enhanced to detect suspicious modifications or unusual HTTP responses. Additionally, organizations should educate users about the risks of interacting with untrusted workflows and consider isolating n8n instances within segmented network zones to limit potential lateral movement. Employing web application firewalls (WAFs) with rules to detect and block reflected XSS payloads in HTTP responses may provide an additional layer of defense. Finally, regular security assessments and penetration testing focused on workflow automation platforms can help identify and remediate similar vulnerabilities proactively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-28T14:50:47.888Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69837ea2f9fa50a62f9d190d
Added to database: 2/4/2026, 5:15:14 PM
Last enriched: 2/12/2026, 7:40:34 AM
Last updated: 3/25/2026, 1:31:42 AM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.