Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25052: CWE-367: Time-of-check Time-of-use (TOCTOU) Race Condition in n8n-io n8n

0
Critical
VulnerabilityCVE-2026-25052cvecve-2026-25052cwe-367
Published: Wed Feb 04 2026 (02/04/2026, 16:47:04 UTC)
Source: CVE Database V5
Vendor/Project: n8n-io
Product: n8n

Description

CVE-2026-25052 is a critical TOCTOU race condition vulnerability in the n8n workflow automation platform prior to versions 1. 123. 18 and 2. 5. 0. Authenticated users with workflow creation or modification permissions can exploit this flaw to bypass file access controls and read sensitive files on the host system. This exposure can lead to disclosure of critical configuration data and user credentials, enabling complete account takeover of any user on the affected instance. The vulnerability requires low privileges but no user interaction and can be exploited remotely. Although no known exploits are reported in the wild yet, the high CVSS score of 9. 4 reflects its severe impact on confidentiality, integrity, and availability.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 07:40:50 UTC

Technical Analysis

CVE-2026-25052 is a time-of-check to time-of-use (TOCTOU) race condition vulnerability classified under CWE-367, affecting the n8n open source workflow automation platform. The flaw exists in the file access control mechanism prior to versions 1.123.18 and 2.5.0, allowing authenticated users with permissions to create or modify workflows to exploit a race condition to bypass intended access restrictions. This enables them to read arbitrary sensitive files on the host system where n8n is running. By accessing critical configuration files and user credentials, an attacker can escalate privileges and achieve complete account takeover of any user on the instance. The vulnerability is remotely exploitable without user interaction and requires only low privileges (workflow modification rights). The CVSS v4.0 score of 9.4 indicates a critical severity, with high impact on confidentiality, integrity, and availability, and a broad scope affecting all users on the instance. Although no public exploits are currently known, the nature of the vulnerability and the sensitive data exposed make it a high-risk issue. The vendor has addressed the vulnerability in versions 1.123.18 and 2.5.0, and users are strongly advised to upgrade. The vulnerability highlights the risks inherent in race conditions within access control logic in automation platforms, which can lead to severe privilege escalation and data breaches.

Potential Impact

For European organizations, this vulnerability poses a significant risk due to the potential for unauthorized disclosure of sensitive configuration data and credentials, leading to full account compromise. Organizations using n8n for critical automation workflows could face operational disruption, data breaches, and lateral movement by attackers within their networks. The ability to take over any user account on the instance increases the risk of insider-like attacks and data exfiltration. Given the increasing adoption of automation platforms in sectors such as finance, healthcare, and manufacturing across Europe, exploitation could lead to regulatory non-compliance, reputational damage, and financial losses. The vulnerability's remote exploitability and lack of user interaction requirements make it easier for attackers to leverage once authenticated, increasing the threat surface. Additionally, compromised credentials could facilitate further attacks against integrated systems and cloud services. The absence of known exploits in the wild currently provides a window for proactive mitigation, but the critical severity demands urgent attention.

Mitigation Recommendations

1. Immediately upgrade all n8n instances to versions 1.123.18 or 2.5.0 or later, where the vulnerability is patched. 2. Restrict workflow creation and modification permissions strictly to trusted administrators to reduce the number of users who can exploit the vulnerability. 3. Implement robust monitoring and alerting for unusual file access patterns or privilege escalations within n8n environments. 4. Employ network segmentation and access controls to limit exposure of n8n hosts to only necessary users and systems. 5. Regularly audit workflow configurations and user permissions to detect unauthorized changes. 6. Use host-based intrusion detection systems to identify attempts to access sensitive files. 7. Educate administrators and users about the risks of granting workflow modification rights and enforce least privilege principles. 8. Maintain up-to-date backups of critical configuration and workflow data to enable recovery in case of compromise. 9. Consider deploying n8n instances in isolated environments or containers with strict file system permissions to limit impact of potential exploitation. 10. Follow vendor advisories and subscribe to security mailing lists for timely updates on this and related vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-28T14:50:47.888Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69837ea2f9fa50a62f9d1912

Added to database: 2/4/2026, 5:15:14 PM

Last enriched: 2/12/2026, 7:40:50 AM

Last updated: 3/25/2026, 3:27:52 AM

Views: 147

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses