CVE-2026-25051: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in n8n-io n8n
n8n is an open source workflow automation platform. Prior to version 1.123.2, a Cross-Site Scripting (XSS) vulnerability has been identified in the handling of webhook responses and related HTTP endpoints. Under certain conditions, the Content Security Policy (CSP) sandbox protection intended to isolate HTML responses may not be applied correctly. An authenticated user with permission to create or modify workflows could abuse this to execute malicious scripts with same-origin privileges when other users interact with the crafted workflow. This could lead to session hijacking and account takeover. This issue has been patched in version 1.123.2.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-25051 affects the n8n open-source workflow automation platform prior to version 1.123.2. It is categorized as a Cross-Site Scripting (XSS) flaw under CWE-79, caused by improper neutralization of input during web page generation. Specifically, the issue occurs in the handling of webhook responses and related HTTP endpoints where user-supplied input is embedded in HTML responses without adequate sanitization. Although n8n implements a Content Security Policy (CSP) sandbox intended to isolate HTML responses and prevent script execution, under certain conditions this CSP sandbox is not correctly applied, allowing malicious scripts to run with same-origin privileges. An attacker must be an authenticated user with permissions to create or modify workflows, enabling them to craft workflows that embed malicious scripts. When other users interact with these workflows, the scripts execute in their browsers, potentially leading to session hijacking, credential theft, or account takeover. The vulnerability does not require administrative privileges but does require some level of authenticated access and user interaction. The CVSS 4.0 base score is 8.5 (high), reflecting the network attack vector, low attack complexity, no need for privileges beyond workflow modification, and partial user interaction. The vulnerability has been addressed in n8n version 1.123.2, which properly enforces the CSP sandbox and sanitizes inputs to prevent script injection. No public exploits or active exploitation campaigns have been reported to date.
Potential Impact
For European organizations using n8n, especially those deploying it internally for workflow automation, this vulnerability poses a significant risk. An attacker with workflow modification rights—potentially a disgruntled insider or compromised user—could inject malicious scripts that execute in the browsers of other users interacting with the workflows. This can lead to session hijacking, unauthorized access to sensitive data, and account takeover, undermining confidentiality and integrity. Given n8n's role in automating business processes, exploitation could disrupt operations or lead to data leakage. The impact is heightened in environments where multiple users collaborate on workflows or where workflows trigger sensitive actions. Since the vulnerability requires authenticated access, organizations with lax access controls or insufficient user privilege management are at greater risk. The lack of known exploits reduces immediate threat but does not eliminate the risk of future attacks, especially as awareness grows. European organizations in sectors with strict data protection regulations (e.g., GDPR) must consider the compliance implications of potential data breaches resulting from exploitation.
Mitigation Recommendations
Organizations should immediately upgrade all n8n instances to version 1.123.2 or later, where the vulnerability is patched. Until upgrade is possible, restrict workflow creation and modification permissions to trusted users only, minimizing the attack surface. Implement strict access controls and monitor user activities related to workflow changes to detect suspicious behavior. Employ web application firewalls (WAFs) with rules to detect and block reflected XSS payloads targeting n8n endpoints. Educate users to be cautious when interacting with workflows created or modified by others, especially if unexpected behavior is observed. Regularly audit workflows for unauthorized or suspicious scripts. Additionally, review and tighten Content Security Policy configurations at the deployment level to reinforce sandboxing. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential compromises.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2026-25051: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in n8n-io n8n
Description
n8n is an open source workflow automation platform. Prior to version 1.123.2, a Cross-Site Scripting (XSS) vulnerability has been identified in the handling of webhook responses and related HTTP endpoints. Under certain conditions, the Content Security Policy (CSP) sandbox protection intended to isolate HTML responses may not be applied correctly. An authenticated user with permission to create or modify workflows could abuse this to execute malicious scripts with same-origin privileges when other users interact with the crafted workflow. This could lead to session hijacking and account takeover. This issue has been patched in version 1.123.2.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2026-25051 affects the n8n open-source workflow automation platform prior to version 1.123.2. It is categorized as a Cross-Site Scripting (XSS) flaw under CWE-79, caused by improper neutralization of input during web page generation. Specifically, the issue occurs in the handling of webhook responses and related HTTP endpoints where user-supplied input is embedded in HTML responses without adequate sanitization. Although n8n implements a Content Security Policy (CSP) sandbox intended to isolate HTML responses and prevent script execution, under certain conditions this CSP sandbox is not correctly applied, allowing malicious scripts to run with same-origin privileges. An attacker must be an authenticated user with permissions to create or modify workflows, enabling them to craft workflows that embed malicious scripts. When other users interact with these workflows, the scripts execute in their browsers, potentially leading to session hijacking, credential theft, or account takeover. The vulnerability does not require administrative privileges but does require some level of authenticated access and user interaction. The CVSS 4.0 base score is 8.5 (high), reflecting the network attack vector, low attack complexity, no need for privileges beyond workflow modification, and partial user interaction. The vulnerability has been addressed in n8n version 1.123.2, which properly enforces the CSP sandbox and sanitizes inputs to prevent script injection. No public exploits or active exploitation campaigns have been reported to date.
Potential Impact
For European organizations using n8n, especially those deploying it internally for workflow automation, this vulnerability poses a significant risk. An attacker with workflow modification rights—potentially a disgruntled insider or compromised user—could inject malicious scripts that execute in the browsers of other users interacting with the workflows. This can lead to session hijacking, unauthorized access to sensitive data, and account takeover, undermining confidentiality and integrity. Given n8n's role in automating business processes, exploitation could disrupt operations or lead to data leakage. The impact is heightened in environments where multiple users collaborate on workflows or where workflows trigger sensitive actions. Since the vulnerability requires authenticated access, organizations with lax access controls or insufficient user privilege management are at greater risk. The lack of known exploits reduces immediate threat but does not eliminate the risk of future attacks, especially as awareness grows. European organizations in sectors with strict data protection regulations (e.g., GDPR) must consider the compliance implications of potential data breaches resulting from exploitation.
Mitigation Recommendations
Organizations should immediately upgrade all n8n instances to version 1.123.2 or later, where the vulnerability is patched. Until upgrade is possible, restrict workflow creation and modification permissions to trusted users only, minimizing the attack surface. Implement strict access controls and monitor user activities related to workflow changes to detect suspicious behavior. Employ web application firewalls (WAFs) with rules to detect and block reflected XSS payloads targeting n8n endpoints. Educate users to be cautious when interacting with workflows created or modified by others, especially if unexpected behavior is observed. Regularly audit workflows for unauthorized or suspicious scripts. Additionally, review and tighten Content Security Policy configurations at the deployment level to reinforce sandboxing. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential compromises.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-28T14:50:47.888Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69837ea2f9fa50a62f9d190d
Added to database: 2/4/2026, 5:15:14 PM
Last enriched: 2/4/2026, 5:31:24 PM
Last updated: 2/6/2026, 8:34:33 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25731: CWE-1336: Improper Neutralization of Special Elements Used in a Template Engine in kovidgoyal calibre
HighCVE-2026-25636: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in kovidgoyal calibre
HighCVE-2026-25635: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in kovidgoyal calibre
HighCVE-2026-2065: Missing Authentication in Flycatcher Toys smART Pixelator
MediumCVE-2026-25640: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in pydantic pydantic-ai
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.