Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25056: CWE-434: Unrestricted Upload of File with Dangerous Type in n8n-io n8n

0
Critical
VulnerabilityCVE-2026-25056cvecve-2026-25056cwe-434cwe-693
Published: Wed Feb 04 2026 (02/04/2026, 16:47:55 UTC)
Source: CVE Database V5
Vendor/Project: n8n-io
Product: n8n

Description

n8n is an open source workflow automation platform. Prior to versions 1.118.0 and 2.4.0, a vulnerability in the Merge node's SQL Query mode allowed authenticated users with permission to create or modify workflows to write arbitrary files to the n8n server's filesystem potentially leading to remote code execution. This issue has been patched in versions 1.118.0 and 2.4.0.

AI-Powered Analysis

AILast updated: 02/04/2026, 17:29:48 UTC

Technical Analysis

The vulnerability identified as CVE-2026-25056 affects the open-source workflow automation platform n8n prior to versions 1.118.0 and 2.4.0. Specifically, it resides in the Merge node's SQL Query mode, where authenticated users with permissions to create or modify workflows can exploit an unrestricted file upload flaw (CWE-434) to write arbitrary files to the server's filesystem. This flaw is compounded by improper validation of file types and content, enabling attackers to upload malicious payloads that can be executed remotely, leading to remote code execution (RCE). The vulnerability also relates to CWE-693, indicating protection mechanisms are bypassed or insufficient. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) highlights that the attack can be performed remotely over the network with low attack complexity, no user interaction, and only requires low privileges (authenticated user with workflow modification rights). The impact on confidentiality, integrity, and availability is high, as attackers can execute arbitrary code, potentially compromising the entire system and connected infrastructure. Although no public exploits have been observed, the vulnerability's nature and scoring suggest it is a critical risk. The issue has been addressed in versions 1.118.0 and 2.4.0, and users are strongly advised to upgrade. The vulnerability is particularly concerning for organizations relying on n8n for automating critical workflows, as an attacker could leverage this flaw to gain persistent access or disrupt operations.

Potential Impact

For European organizations, the impact of CVE-2026-25056 is significant. Many enterprises and public sector entities use workflow automation platforms like n8n to streamline business processes, integrate services, and manage data flows. Exploitation could lead to unauthorized access to sensitive data, disruption of automated workflows, and full system compromise through remote code execution. This could result in data breaches, operational downtime, and potential regulatory non-compliance under GDPR due to loss of data confidentiality and integrity. The ability for an authenticated user with relatively low privileges to escalate to full system compromise increases insider threat risks and the impact of compromised credentials. Additionally, the attack vector does not require user interaction, making automated exploitation feasible once credentials are obtained. This vulnerability could also be leveraged as a foothold for lateral movement within networks, threatening broader organizational security. The critical nature of the flaw necessitates urgent remediation to prevent potential exploitation and associated financial, reputational, and legal damages.

Mitigation Recommendations

European organizations should immediately upgrade all n8n instances to versions 1.118.0 or 2.4.0 or later to remediate this vulnerability. Until upgrades are applied, restrict workflow creation and modification permissions strictly to trusted administrators to limit the pool of users who can exploit the flaw. Implement strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. Monitor system logs and file system changes for unusual activity, particularly unexpected file writes in directories used by n8n. Employ network segmentation to isolate n8n servers from critical infrastructure and sensitive data stores. Consider deploying application-layer firewalls or runtime application self-protection (RASP) solutions to detect and block suspicious file upload or execution attempts. Regularly audit workflow configurations and user permissions to ensure adherence to the principle of least privilege. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential compromises.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-28T14:50:47.888Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69837ea2f9fa50a62f9d1922

Added to database: 2/4/2026, 5:15:14 PM

Last enriched: 2/4/2026, 5:29:48 PM

Last updated: 2/6/2026, 1:45:27 PM

Views: 88

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats