CVE-2026-25055: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in n8n-io n8n
CVE-2026-25055 is a high-severity path traversal vulnerability in the open-source workflow automation platform n8n prior to versions 1. 123. 12 and 2. 4. 0. It arises when workflows process uploaded files and transfer them to remote servers via the SSH node without validating file metadata, allowing an unauthenticated attacker to write files to arbitrary locations on remote systems. Exploitation requires knowledge of existing vulnerable workflows and unauthenticated access to file upload endpoints. Successful exploitation can lead to remote code execution on the targeted remote servers. The vulnerability has been patched in the specified versions. No known exploits are currently reported in the wild.
AI Analysis
Technical Summary
CVE-2026-25055 is a path traversal vulnerability (CWE-22) affecting n8n, an open-source workflow automation platform. The flaw exists in versions prior to 1.123.12 and 2.4.0, where workflows that handle uploaded files and subsequently transfer them to remote servers via the SSH node do not properly validate the metadata of these files. This improper validation allows an attacker to craft file uploads with manipulated pathnames, causing files to be written outside the intended directories on remote systems. Because the SSH node executes file transfers, this can lead to remote code execution on those remote servers if malicious files are placed in executable locations. Exploitation requires the attacker to be unauthenticated but have knowledge of the vulnerable workflows and access to unauthenticated file upload endpoints. The vulnerability has a CVSS 4.0 score of 7.1, reflecting high severity due to network attack vector, no privileges required, no user interaction, but with high scope and impact on confidentiality, integrity, and availability. The issue was publicly disclosed and patched in versions 1.123.12 and 2.4.0. No known exploits have been observed in the wild, but the potential for severe impact exists if exploited. The vulnerability highlights the importance of validating file metadata and securing upload endpoints in automation platforms that interact with remote systems.
Potential Impact
For European organizations, the impact of CVE-2026-25055 can be significant, particularly for those relying on n8n for automating workflows involving file transfers to remote servers. Successful exploitation can lead to unauthorized file writes on critical remote systems, potentially resulting in remote code execution, data breaches, or disruption of automated processes. This could compromise sensitive data confidentiality, integrity, and availability of services. Organizations in sectors such as finance, healthcare, manufacturing, and critical infrastructure that use n8n to automate sensitive workflows are at heightened risk. The ability for an unauthenticated attacker to exploit this vulnerability increases the threat level, especially if upload endpoints are exposed without authentication. Additionally, the cross-system nature of the attack (from the n8n platform to remote servers via SSH) broadens the attack surface and complicates incident response. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score underscores the urgency of patching and securing affected systems.
Mitigation Recommendations
1. Immediately upgrade all n8n instances to version 1.123.12 or 2.4.0 or later to apply the official patch addressing this vulnerability. 2. Restrict access to file upload endpoints by enforcing strong authentication and authorization controls to prevent unauthenticated access. 3. Implement strict validation of file metadata and pathnames within workflows before processing or transferring files, ensuring that path traversal sequences are sanitized or rejected. 4. Limit the SSH node's permissions on remote servers to the minimum necessary, using dedicated service accounts with constrained privileges and directory access. 5. Monitor logs and alerts for unusual file transfer activities or unexpected file writes on remote systems, enabling rapid detection of exploitation attempts. 6. Conduct regular security audits and penetration tests focusing on workflow automation components and their integration points. 7. Educate developers and administrators on secure workflow design principles, emphasizing input validation and endpoint security. 8. Consider network segmentation to isolate automation platforms from critical infrastructure where feasible.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Switzerland
CVE-2026-25055: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in n8n-io n8n
Description
CVE-2026-25055 is a high-severity path traversal vulnerability in the open-source workflow automation platform n8n prior to versions 1. 123. 12 and 2. 4. 0. It arises when workflows process uploaded files and transfer them to remote servers via the SSH node without validating file metadata, allowing an unauthenticated attacker to write files to arbitrary locations on remote systems. Exploitation requires knowledge of existing vulnerable workflows and unauthenticated access to file upload endpoints. Successful exploitation can lead to remote code execution on the targeted remote servers. The vulnerability has been patched in the specified versions. No known exploits are currently reported in the wild.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-25055 is a path traversal vulnerability (CWE-22) affecting n8n, an open-source workflow automation platform. The flaw exists in versions prior to 1.123.12 and 2.4.0, where workflows that handle uploaded files and subsequently transfer them to remote servers via the SSH node do not properly validate the metadata of these files. This improper validation allows an attacker to craft file uploads with manipulated pathnames, causing files to be written outside the intended directories on remote systems. Because the SSH node executes file transfers, this can lead to remote code execution on those remote servers if malicious files are placed in executable locations. Exploitation requires the attacker to be unauthenticated but have knowledge of the vulnerable workflows and access to unauthenticated file upload endpoints. The vulnerability has a CVSS 4.0 score of 7.1, reflecting high severity due to network attack vector, no privileges required, no user interaction, but with high scope and impact on confidentiality, integrity, and availability. The issue was publicly disclosed and patched in versions 1.123.12 and 2.4.0. No known exploits have been observed in the wild, but the potential for severe impact exists if exploited. The vulnerability highlights the importance of validating file metadata and securing upload endpoints in automation platforms that interact with remote systems.
Potential Impact
For European organizations, the impact of CVE-2026-25055 can be significant, particularly for those relying on n8n for automating workflows involving file transfers to remote servers. Successful exploitation can lead to unauthorized file writes on critical remote systems, potentially resulting in remote code execution, data breaches, or disruption of automated processes. This could compromise sensitive data confidentiality, integrity, and availability of services. Organizations in sectors such as finance, healthcare, manufacturing, and critical infrastructure that use n8n to automate sensitive workflows are at heightened risk. The ability for an unauthenticated attacker to exploit this vulnerability increases the threat level, especially if upload endpoints are exposed without authentication. Additionally, the cross-system nature of the attack (from the n8n platform to remote servers via SSH) broadens the attack surface and complicates incident response. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score underscores the urgency of patching and securing affected systems.
Mitigation Recommendations
1. Immediately upgrade all n8n instances to version 1.123.12 or 2.4.0 or later to apply the official patch addressing this vulnerability. 2. Restrict access to file upload endpoints by enforcing strong authentication and authorization controls to prevent unauthenticated access. 3. Implement strict validation of file metadata and pathnames within workflows before processing or transferring files, ensuring that path traversal sequences are sanitized or rejected. 4. Limit the SSH node's permissions on remote servers to the minimum necessary, using dedicated service accounts with constrained privileges and directory access. 5. Monitor logs and alerts for unusual file transfer activities or unexpected file writes on remote systems, enabling rapid detection of exploitation attempts. 6. Conduct regular security audits and penetration tests focusing on workflow automation components and their integration points. 7. Educate developers and administrators on secure workflow design principles, emphasizing input validation and endpoint security. 8. Consider network segmentation to isolate automation platforms from critical infrastructure where feasible.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-28T14:50:47.888Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69837ea2f9fa50a62f9d191e
Added to database: 2/4/2026, 5:15:14 PM
Last enriched: 2/12/2026, 7:41:35 AM
Last updated: 3/23/2026, 11:55:08 PM
Views: 82
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.