n8n is an open source workflow automation platform. Versions 0.123.1 through 1.119.1 do not have adequate protections to prevent RCE through the project's pre-commit hooks. The Add Config operation allows workflows to set arbitrary Git configuration values, including core.hooksPath, which can point to a malicious Git hook that executes arbitrary commands on the n8n host during subsequent Git operations. Exploitation requires the ability to create or modify an n8n workflow using the Git node. This issue is fixed in version 1.119.2. Workarounds include excluding the Git Node (Docs) and avoiding cloning or interacting with untrusted repositories using the Git Node.
References
| Link | Resource |
|---|---|
| https://github.com/n8n-io/n8n/commit/d5a1171f95f75def5c3ac577707ab913e22aef04 | Patch |
| https://github.com/n8n-io/n8n/releases/tag/n8n%401.119.2 | Release Notes |
| https://github.com/n8n-io/n8n/security/advisories/GHSA-wpqc-h9wp-chmq | Exploit Vendor Advisory |
| https://n8n-docs.teamlab.info/hosting/securing/blocking-nodes/#exclude-nodes | Third Party Advisory |
Configurations
History
02 Jan 2026, 21:10
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
N8n n8n
N8n |
|
| CPE | cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:* | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
| References | () https://github.com/n8n-io/n8n/commit/d5a1171f95f75def5c3ac577707ab913e22aef04 - Patch | |
| References | () https://github.com/n8n-io/n8n/releases/tag/n8n%401.119.2 - Release Notes | |
| References | () https://github.com/n8n-io/n8n/security/advisories/GHSA-wpqc-h9wp-chmq - Exploit, Vendor Advisory | |
| References | () https://n8n-docs.teamlab.info/hosting/securing/blocking-nodes/#exclude-nodes - Third Party Advisory |
09 Dec 2025, 00:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-12-09 00:15
Updated : 2026-01-02 21:10
NVD link : CVE-2025-65964
Mitre link : CVE-2025-65964
CVE.ORG link : CVE-2025-65964
JSON object : View
Products Affected
n8n
- n8n
CWE
CWE-829
Inclusion of Functionality from Untrusted Control Sphere
