Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25055: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in n8n-io n8n

0
High
VulnerabilityCVE-2026-25055cvecve-2026-25055cwe-22
Published: Wed Feb 04 2026 (02/04/2026, 16:47:47 UTC)
Source: CVE Database V5
Vendor/Project: n8n-io
Product: n8n

Description

CVE-2026-25055 is a high-severity path traversal vulnerability in the open-source workflow automation platform n8n prior to versions 1. 123. 12 and 2. 4. 0. It arises when workflows process uploaded files and transfer them to remote servers via the SSH node without validating file metadata, allowing an unauthenticated attacker to write files to arbitrary locations on remote systems. Exploitation requires knowledge of existing vulnerable workflows and unauthenticated access to file upload endpoints. Successful exploitation can lead to remote code execution on the targeted remote servers. The vulnerability has been patched in the specified versions. No known exploits are currently reported in the wild.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 07:41:35 UTC

Technical Analysis

CVE-2026-25055 is a path traversal vulnerability (CWE-22) affecting n8n, an open-source workflow automation platform. The flaw exists in versions prior to 1.123.12 and 2.4.0, where workflows that handle uploaded files and subsequently transfer them to remote servers via the SSH node do not properly validate the metadata of these files. This improper validation allows an attacker to craft file uploads with manipulated pathnames, causing files to be written outside the intended directories on remote systems. Because the SSH node executes file transfers, this can lead to remote code execution on those remote servers if malicious files are placed in executable locations. Exploitation requires the attacker to be unauthenticated but have knowledge of the vulnerable workflows and access to unauthenticated file upload endpoints. The vulnerability has a CVSS 4.0 score of 7.1, reflecting high severity due to network attack vector, no privileges required, no user interaction, but with high scope and impact on confidentiality, integrity, and availability. The issue was publicly disclosed and patched in versions 1.123.12 and 2.4.0. No known exploits have been observed in the wild, but the potential for severe impact exists if exploited. The vulnerability highlights the importance of validating file metadata and securing upload endpoints in automation platforms that interact with remote systems.

Potential Impact

For European organizations, the impact of CVE-2026-25055 can be significant, particularly for those relying on n8n for automating workflows involving file transfers to remote servers. Successful exploitation can lead to unauthorized file writes on critical remote systems, potentially resulting in remote code execution, data breaches, or disruption of automated processes. This could compromise sensitive data confidentiality, integrity, and availability of services. Organizations in sectors such as finance, healthcare, manufacturing, and critical infrastructure that use n8n to automate sensitive workflows are at heightened risk. The ability for an unauthenticated attacker to exploit this vulnerability increases the threat level, especially if upload endpoints are exposed without authentication. Additionally, the cross-system nature of the attack (from the n8n platform to remote servers via SSH) broadens the attack surface and complicates incident response. The absence of known exploits in the wild provides a window for proactive mitigation, but the high severity score underscores the urgency of patching and securing affected systems.

Mitigation Recommendations

1. Immediately upgrade all n8n instances to version 1.123.12 or 2.4.0 or later to apply the official patch addressing this vulnerability. 2. Restrict access to file upload endpoints by enforcing strong authentication and authorization controls to prevent unauthenticated access. 3. Implement strict validation of file metadata and pathnames within workflows before processing or transferring files, ensuring that path traversal sequences are sanitized or rejected. 4. Limit the SSH node's permissions on remote servers to the minimum necessary, using dedicated service accounts with constrained privileges and directory access. 5. Monitor logs and alerts for unusual file transfer activities or unexpected file writes on remote systems, enabling rapid detection of exploitation attempts. 6. Conduct regular security audits and penetration tests focusing on workflow automation components and their integration points. 7. Educate developers and administrators on secure workflow design principles, emphasizing input validation and endpoint security. 8. Consider network segmentation to isolate automation platforms from critical infrastructure where feasible.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-28T14:50:47.888Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69837ea2f9fa50a62f9d191e

Added to database: 2/4/2026, 5:15:14 PM

Last enriched: 2/12/2026, 7:41:35 AM

Last updated: 3/23/2026, 11:55:08 PM

Views: 82

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses