n8n is an open source workflow automation platform. Prior to 1.113.0, a remote code execution vulnerability exists in the Git Node component available in both Cloud and Self-Hosted versions of n8n. When a malicious actor clones a remote repository containing a pre-commit hook, the subsequent use of the Commit operation in the Git Node can inadvertently trigger the hook’s execution. This allows attackers to execute arbitrary code within the n8n environment, potentially compromising the system and any connected credentials or workflows. This vulnerability is fixed in 1.113.0.
References
| Link | Resource |
|---|---|
| https://github.com/n8n-io/n8n/commit/5bf3db5ba84d3195bbe11bbd3c62f7086e090997 | Patch |
| https://github.com/n8n-io/n8n/pull/19559 | Issue Tracking |
| https://github.com/n8n-io/n8n/security/advisories/GHSA-xgp7-7qjq-vg47 | Patch Vendor Advisory |
Configurations
History
31 Dec 2025, 02:30
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/n8n-io/n8n/commit/5bf3db5ba84d3195bbe11bbd3c62f7086e090997 - Patch | |
| References | () https://github.com/n8n-io/n8n/pull/19559 - Issue Tracking | |
| References | () https://github.com/n8n-io/n8n/security/advisories/GHSA-xgp7-7qjq-vg47 - Patch, Vendor Advisory | |
| CPE | cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:* | |
| First Time |
N8n n8n
N8n |
30 Oct 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-30 17:15
Updated : 2025-12-31 02:30
NVD link : CVE-2025-62726
Mitre link : CVE-2025-62726
CVE.ORG link : CVE-2025-62726
JSON object : View
Products Affected
n8n
- n8n
CWE
CWE-829
Inclusion of Functionality from Untrusted Control Sphere
