n8n is an open source workflow automation platform. From 1.36.0 to before 2.2.0, the Webhook node’s IP whitelist validation performed partial string matching instead of exact IP comparison. As a result, an incoming request could be accepted if the source IP address merely contained the configured whitelist entry as a substring. This issue affected instances where workflow editors relied on IP-based access controls to restrict webhook access. Both IPv4 and IPv6 addresses were impacted. An attacker with a non-whitelisted IP could bypass restrictions if their IP shared a partial prefix with a trusted address, undermining the intended security boundary. This vulnerability is fixed in 2.2.0.
References
| Link | Resource |
|---|---|
| https://github.com/n8n-io/n8n/commit/11f8597d4ad69ea3b58941573997fdbc4de1fec5 | Patch |
| https://github.com/n8n-io/n8n/issues/23399 | Issue Tracking Patch |
| https://github.com/n8n-io/n8n/pull/23399 | Issue Tracking Patch |
| https://github.com/n8n-io/n8n/security/advisories/GHSA-w96v-gf22-crwp | Vendor Advisory |
Configurations
History
16 Jan 2026, 18:47
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
N8n n8n
N8n |
|
| CPE | cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/n8n-io/n8n/commit/11f8597d4ad69ea3b58941573997fdbc4de1fec5 - Patch | |
| References | () https://github.com/n8n-io/n8n/issues/23399 - Issue Tracking, Patch | |
| References | () https://github.com/n8n-io/n8n/pull/23399 - Issue Tracking, Patch | |
| References | () https://github.com/n8n-io/n8n/security/advisories/GHSA-w96v-gf22-crwp - Vendor Advisory |
13 Jan 2026, 19:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-13 19:16
Updated : 2026-01-16 18:47
NVD link : CVE-2025-68949
Mitre link : CVE-2025-68949
CVE.ORG link : CVE-2025-68949
JSON object : View
Products Affected
n8n
- n8n
