Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25052: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition in n8n-io n8n

0
Critical
VulnerabilityCVE-2026-25052cvecve-2026-25052cwe-367
Published: Wed Feb 04 2026 (02/04/2026, 16:47:04 UTC)
Source: CVE Database V5
Vendor/Project: n8n-io
Product: n8n

Description

n8n is an open source workflow automation platform. Prior to versions 1.123.18 and 2.5.0, a vulnerability in the file access controls allows authenticated users with permission to create or modify workflows to read sensitive files from the n8n host system. This can be exploited to obtain critical configuration data and user credentials, leading to complete account takeover of any user on the instance. This issue has been patched in versions 1.123.18 and 2.5.0.

AI-Powered Analysis

AILast updated: 02/04/2026, 17:31:10 UTC

Technical Analysis

CVE-2026-25052 is a critical security vulnerability classified as a Time-of-check Time-of-use (TOCTOU) race condition (CWE-367) in the n8n open source workflow automation platform. This flaw exists in the file access control mechanism prior to versions 1.123.18 and 2.5.0. The vulnerability allows authenticated users who have permissions to create or modify workflows to exploit a race condition between the time a file access check is performed and the time the file is actually used. This race condition enables these users to bypass intended file access restrictions and read sensitive files from the host system where n8n is running. By reading these files, attackers can extract critical configuration data and user credentials stored on the system. This can lead to a complete account takeover of any user on the n8n instance, escalating privileges and compromising the entire platform. The vulnerability is remotely exploitable without user interaction and requires only low privileges (workflow modification rights). The CVSS v4.0 base score is 9.4, indicating a critical severity with high impact on confidentiality, integrity, and availability. The vulnerability was publicly disclosed on February 4, 2026, and patches have been released in versions 1.123.18 and 2.5.0 to fix the issue. No known exploits have been reported in the wild yet, but the ease of exploitation and potential impact make this a significant threat. Organizations using n8n for automation workflows should prioritize patching and review user permissions to mitigate risk.

Potential Impact

For European organizations, this vulnerability poses a severe risk to the confidentiality and integrity of sensitive data managed within n8n workflows. Since n8n is often used to automate business-critical processes, exploitation could lead to unauthorized disclosure of configuration secrets, credentials, and potentially sensitive business logic. Attackers gaining full account takeover can manipulate workflows, disrupt automation processes, and pivot to other internal systems, causing operational disruption and data breaches. The impact is heightened in multi-tenant or shared environments where multiple users have workflow modification rights. Compliance with GDPR and other data protection regulations could be jeopardized if personal or sensitive data is exposed. The critical nature of the vulnerability and its ease of exploitation mean that organizations could face significant financial, reputational, and regulatory consequences if exploited.

Mitigation Recommendations

1. Immediately upgrade all n8n instances to version 1.123.18 or 2.5.0 or later to apply the official patch addressing the TOCTOU race condition. 2. Restrict workflow creation and modification permissions strictly to trusted administrators or users with a demonstrated need, minimizing the number of accounts that can exploit this vulnerability. 3. Implement robust monitoring and alerting on n8n instances for unusual file access patterns or privilege escalations, including logs of workflow changes and file reads. 4. Conduct regular audits of user permissions and workflow configurations to detect unauthorized modifications. 5. Isolate n8n hosts in segmented network zones with limited access to sensitive backend systems and credentials. 6. Employ host-based security controls such as file integrity monitoring and endpoint detection to detect exploitation attempts. 7. Educate administrators and users about the risks of granting excessive permissions within automation platforms. 8. Consider additional compensating controls such as multi-factor authentication for user accounts with workflow modification rights to reduce risk of account takeover.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-28T14:50:47.888Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69837ea2f9fa50a62f9d1912

Added to database: 2/4/2026, 5:15:14 PM

Last enriched: 2/4/2026, 5:31:10 PM

Last updated: 2/7/2026, 7:16:09 PM

Views: 76

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats