n8n is an open source workflow automation platform. Prior to versions 1.123.17 and 2.5.2, an authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. This issue has been patched in versions 1.123.17 and 2.5.2.
References
Configurations
Configuration 1 (hide)
|
History
05 Feb 2026, 20:22
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
N8n n8n
N8n |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.9 |
| CPE | cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:* | |
| References | () https://github.com/n8n-io/n8n/commit/7860896909b3d42993a36297f053d2b0e633235d - Patch | |
| References | () https://github.com/n8n-io/n8n/commit/936c06cfc1ad269a89e8ef7f8ac79c104436d54b - Patch | |
| References | () https://github.com/n8n-io/n8n/security/advisories/GHSA-6cqr-8cfr-67f8 - Patch, Vendor Advisory |
04 Feb 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-04 17:16
Updated : 2026-02-05 20:22
NVD link : CVE-2026-25049
Mitre link : CVE-2026-25049
CVE.ORG link : CVE-2026-25049
JSON object : View
Products Affected
n8n
- n8n
CWE
CWE-913
Improper Control of Dynamically-Managed Code Resources
