CVE-2026-25056: CWE-434: Unrestricted Upload of File with Dangerous Type in n8n-io n8n
CVE-2026-25056 is a critical vulnerability in the n8n workflow automation platform affecting versions prior to 1. 118. 0 and 2. 4. 0. It allows authenticated users with workflow creation or modification permissions to exploit the Merge node's SQL Query mode to write arbitrary files to the server filesystem. This unrestricted file upload can lead to remote code execution without requiring user interaction. The vulnerability has a high CVSS 4. 0 score of 9. 4, indicating severe impact on confidentiality, integrity, and availability.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-25056 affects the open-source workflow automation platform n8n in versions prior to 1.118.0 and 2.4.0. It stems from an unrestricted file upload flaw (CWE-434) in the Merge node's SQL Query mode, which is accessible to authenticated users who have permissions to create or modify workflows. This flaw allows these users to write arbitrary files to the server's filesystem, potentially enabling remote code execution (RCE). The vulnerability is critical because it does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L) and no need for additional privileges beyond workflow modification rights (PR:L). The CVSS 4.0 vector indicates high impact on confidentiality, integrity, and availability, with scope and security requirements also rated high. The vulnerability arises from insufficient validation and sanitization of file uploads within the workflow node, allowing dangerous file types to be written and executed. Although no exploits have been observed in the wild yet, the potential for attackers to gain full control of the n8n server is significant. The vendor has addressed the issue in versions 1.118.0 and 2.4.0 by implementing proper file validation and restricting dangerous file uploads. Organizations relying on n8n for automation workflows must upgrade to these patched versions to mitigate the risk.
Potential Impact
For European organizations, this vulnerability poses a severe risk, especially those using n8n for critical business process automation. Exploitation could lead to unauthorized access, data breaches, and disruption of automated workflows, impacting operational continuity. Remote code execution could allow attackers to pivot within internal networks, exfiltrate sensitive data, or deploy ransomware. Sectors such as finance, healthcare, manufacturing, and government agencies that increasingly rely on automation platforms are particularly vulnerable. The compromise of n8n servers could also affect supply chain operations and interconnected services. Given the criticality and ease of exploitation, the threat could result in significant financial losses, reputational damage, and regulatory penalties under GDPR if personal data is exposed. The absence of known exploits in the wild currently provides a window for proactive mitigation but should not lead to complacency.
Mitigation Recommendations
1. Immediately upgrade all n8n instances to version 1.118.0 or 2.4.0 or later to apply the official patch addressing this vulnerability. 2. Restrict workflow creation and modification permissions to trusted administrators only, minimizing the number of users who can exploit this flaw. 3. Implement strict input validation and file type restrictions at the application and network layers to prevent dangerous file uploads. 4. Monitor filesystem activity on n8n servers for unusual file creation or modification, especially in directories accessible by the application. 5. Employ application-layer firewalls or runtime application self-protection (RASP) tools to detect and block suspicious behavior related to file uploads and execution. 6. Conduct regular security audits and penetration testing focused on workflow automation platforms. 7. Isolate n8n servers within segmented network zones with limited access to critical infrastructure. 8. Maintain comprehensive logging and alerting for workflow changes and server file system events to enable rapid incident response.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain
CVE-2026-25056: CWE-434: Unrestricted Upload of File with Dangerous Type in n8n-io n8n
Description
CVE-2026-25056 is a critical vulnerability in the n8n workflow automation platform affecting versions prior to 1. 118. 0 and 2. 4. 0. It allows authenticated users with workflow creation or modification permissions to exploit the Merge node's SQL Query mode to write arbitrary files to the server filesystem. This unrestricted file upload can lead to remote code execution without requiring user interaction. The vulnerability has a high CVSS 4. 0 score of 9. 4, indicating severe impact on confidentiality, integrity, and availability.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-25056 affects the open-source workflow automation platform n8n in versions prior to 1.118.0 and 2.4.0. It stems from an unrestricted file upload flaw (CWE-434) in the Merge node's SQL Query mode, which is accessible to authenticated users who have permissions to create or modify workflows. This flaw allows these users to write arbitrary files to the server's filesystem, potentially enabling remote code execution (RCE). The vulnerability is critical because it does not require user interaction and can be exploited remotely over the network (AV:N), with low attack complexity (AC:L) and no need for additional privileges beyond workflow modification rights (PR:L). The CVSS 4.0 vector indicates high impact on confidentiality, integrity, and availability, with scope and security requirements also rated high. The vulnerability arises from insufficient validation and sanitization of file uploads within the workflow node, allowing dangerous file types to be written and executed. Although no exploits have been observed in the wild yet, the potential for attackers to gain full control of the n8n server is significant. The vendor has addressed the issue in versions 1.118.0 and 2.4.0 by implementing proper file validation and restricting dangerous file uploads. Organizations relying on n8n for automation workflows must upgrade to these patched versions to mitigate the risk.
Potential Impact
For European organizations, this vulnerability poses a severe risk, especially those using n8n for critical business process automation. Exploitation could lead to unauthorized access, data breaches, and disruption of automated workflows, impacting operational continuity. Remote code execution could allow attackers to pivot within internal networks, exfiltrate sensitive data, or deploy ransomware. Sectors such as finance, healthcare, manufacturing, and government agencies that increasingly rely on automation platforms are particularly vulnerable. The compromise of n8n servers could also affect supply chain operations and interconnected services. Given the criticality and ease of exploitation, the threat could result in significant financial losses, reputational damage, and regulatory penalties under GDPR if personal data is exposed. The absence of known exploits in the wild currently provides a window for proactive mitigation but should not lead to complacency.
Mitigation Recommendations
1. Immediately upgrade all n8n instances to version 1.118.0 or 2.4.0 or later to apply the official patch addressing this vulnerability. 2. Restrict workflow creation and modification permissions to trusted administrators only, minimizing the number of users who can exploit this flaw. 3. Implement strict input validation and file type restrictions at the application and network layers to prevent dangerous file uploads. 4. Monitor filesystem activity on n8n servers for unusual file creation or modification, especially in directories accessible by the application. 5. Employ application-layer firewalls or runtime application self-protection (RASP) tools to detect and block suspicious behavior related to file uploads and execution. 6. Conduct regular security audits and penetration testing focused on workflow automation platforms. 7. Isolate n8n servers within segmented network zones with limited access to critical infrastructure. 8. Maintain comprehensive logging and alerting for workflow changes and server file system events to enable rapid incident response.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-28T14:50:47.888Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69837ea2f9fa50a62f9d1922
Added to database: 2/4/2026, 5:15:14 PM
Last enriched: 2/12/2026, 7:41:58 AM
Last updated: 3/22/2026, 4:48:03 PM
Views: 187
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.