CVE-2026-25056: CWE-434: Unrestricted Upload of File with Dangerous Type in n8n-io n8n
n8n is an open source workflow automation platform. Prior to versions 1.118.0 and 2.4.0, a vulnerability in the Merge node's SQL Query mode allowed authenticated users with permission to create or modify workflows to write arbitrary files to the n8n server's filesystem potentially leading to remote code execution. This issue has been patched in versions 1.118.0 and 2.4.0.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-25056 affects the open-source workflow automation platform n8n prior to versions 1.118.0 and 2.4.0. Specifically, it resides in the Merge node's SQL Query mode, where authenticated users with permissions to create or modify workflows can exploit an unrestricted file upload flaw (CWE-434) to write arbitrary files to the server's filesystem. This flaw is compounded by improper validation of file types and content, enabling attackers to upload malicious payloads that can be executed remotely, leading to remote code execution (RCE). The vulnerability also relates to CWE-693, indicating protection mechanisms are bypassed or insufficient. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) highlights that the attack can be performed remotely over the network with low attack complexity, no user interaction, and only requires low privileges (authenticated user with workflow modification rights). The impact on confidentiality, integrity, and availability is high, as attackers can execute arbitrary code, potentially compromising the entire system and connected infrastructure. Although no public exploits have been observed, the vulnerability's nature and scoring suggest it is a critical risk. The issue has been addressed in versions 1.118.0 and 2.4.0, and users are strongly advised to upgrade. The vulnerability is particularly concerning for organizations relying on n8n for automating critical workflows, as an attacker could leverage this flaw to gain persistent access or disrupt operations.
Potential Impact
For European organizations, the impact of CVE-2026-25056 is significant. Many enterprises and public sector entities use workflow automation platforms like n8n to streamline business processes, integrate services, and manage data flows. Exploitation could lead to unauthorized access to sensitive data, disruption of automated workflows, and full system compromise through remote code execution. This could result in data breaches, operational downtime, and potential regulatory non-compliance under GDPR due to loss of data confidentiality and integrity. The ability for an authenticated user with relatively low privileges to escalate to full system compromise increases insider threat risks and the impact of compromised credentials. Additionally, the attack vector does not require user interaction, making automated exploitation feasible once credentials are obtained. This vulnerability could also be leveraged as a foothold for lateral movement within networks, threatening broader organizational security. The critical nature of the flaw necessitates urgent remediation to prevent potential exploitation and associated financial, reputational, and legal damages.
Mitigation Recommendations
European organizations should immediately upgrade all n8n instances to versions 1.118.0 or 2.4.0 or later to remediate this vulnerability. Until upgrades are applied, restrict workflow creation and modification permissions strictly to trusted administrators to limit the pool of users who can exploit the flaw. Implement strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. Monitor system logs and file system changes for unusual activity, particularly unexpected file writes in directories used by n8n. Employ network segmentation to isolate n8n servers from critical infrastructure and sensitive data stores. Consider deploying application-layer firewalls or runtime application self-protection (RASP) solutions to detect and block suspicious file upload or execution attempts. Regularly audit workflow configurations and user permissions to ensure adherence to the principle of least privilege. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential compromises.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Finland, Belgium, Italy
CVE-2026-25056: CWE-434: Unrestricted Upload of File with Dangerous Type in n8n-io n8n
Description
n8n is an open source workflow automation platform. Prior to versions 1.118.0 and 2.4.0, a vulnerability in the Merge node's SQL Query mode allowed authenticated users with permission to create or modify workflows to write arbitrary files to the n8n server's filesystem potentially leading to remote code execution. This issue has been patched in versions 1.118.0 and 2.4.0.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2026-25056 affects the open-source workflow automation platform n8n prior to versions 1.118.0 and 2.4.0. Specifically, it resides in the Merge node's SQL Query mode, where authenticated users with permissions to create or modify workflows can exploit an unrestricted file upload flaw (CWE-434) to write arbitrary files to the server's filesystem. This flaw is compounded by improper validation of file types and content, enabling attackers to upload malicious payloads that can be executed remotely, leading to remote code execution (RCE). The vulnerability also relates to CWE-693, indicating protection mechanisms are bypassed or insufficient. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) highlights that the attack can be performed remotely over the network with low attack complexity, no user interaction, and only requires low privileges (authenticated user with workflow modification rights). The impact on confidentiality, integrity, and availability is high, as attackers can execute arbitrary code, potentially compromising the entire system and connected infrastructure. Although no public exploits have been observed, the vulnerability's nature and scoring suggest it is a critical risk. The issue has been addressed in versions 1.118.0 and 2.4.0, and users are strongly advised to upgrade. The vulnerability is particularly concerning for organizations relying on n8n for automating critical workflows, as an attacker could leverage this flaw to gain persistent access or disrupt operations.
Potential Impact
For European organizations, the impact of CVE-2026-25056 is significant. Many enterprises and public sector entities use workflow automation platforms like n8n to streamline business processes, integrate services, and manage data flows. Exploitation could lead to unauthorized access to sensitive data, disruption of automated workflows, and full system compromise through remote code execution. This could result in data breaches, operational downtime, and potential regulatory non-compliance under GDPR due to loss of data confidentiality and integrity. The ability for an authenticated user with relatively low privileges to escalate to full system compromise increases insider threat risks and the impact of compromised credentials. Additionally, the attack vector does not require user interaction, making automated exploitation feasible once credentials are obtained. This vulnerability could also be leveraged as a foothold for lateral movement within networks, threatening broader organizational security. The critical nature of the flaw necessitates urgent remediation to prevent potential exploitation and associated financial, reputational, and legal damages.
Mitigation Recommendations
European organizations should immediately upgrade all n8n instances to versions 1.118.0 or 2.4.0 or later to remediate this vulnerability. Until upgrades are applied, restrict workflow creation and modification permissions strictly to trusted administrators to limit the pool of users who can exploit the flaw. Implement strong authentication mechanisms, including multi-factor authentication (MFA), to reduce the risk of credential compromise. Monitor system logs and file system changes for unusual activity, particularly unexpected file writes in directories used by n8n. Employ network segmentation to isolate n8n servers from critical infrastructure and sensitive data stores. Consider deploying application-layer firewalls or runtime application self-protection (RASP) solutions to detect and block suspicious file upload or execution attempts. Regularly audit workflow configurations and user permissions to ensure adherence to the principle of least privilege. Finally, maintain up-to-date backups and incident response plans to quickly recover from potential compromises.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-28T14:50:47.888Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69837ea2f9fa50a62f9d1922
Added to database: 2/4/2026, 5:15:14 PM
Last enriched: 2/4/2026, 5:29:48 PM
Last updated: 2/6/2026, 1:45:27 PM
Views: 88
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1337: CWE-117 Improper Output Neutralization for Logs in neo4j Enterprise Edition
LowCVE-2025-13818: CWE-367 Time-of-check Time-of-use (TOCTOU) Race Condition in ESET spol s.r.o. ESET Management Agent
HighCVE-2026-2055: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-2054: Information Disclosure in D-Link DIR-605L
MediumCVE-2026-2018: SQL Injection in itsourcecode School Management System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.