CVE-2026-25052

n8n is an open source workflow automation platform. Prior to versions 1.123.18 and 2.5.0, a vulnerability in the file access controls allows authenticated users with permission to create or modify workflows to read sensitive files from the n8n host system. This can be exploited to obtain critical configuration data and user credentials, leading to complete account takeover of any user on the instance. This issue has been patched in versions 1.123.18 and 2.5.0.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:*
cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:*

History

05 Feb 2026, 20:32

Type Values Removed Values Added
CPE cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.9
References () https://github.com/n8n-io/n8n/security/advisories/GHSA-gfvg-qv54-r4pc - () https://github.com/n8n-io/n8n/security/advisories/GHSA-gfvg-qv54-r4pc - Patch, Vendor Advisory
First Time N8n n8n
N8n
CWE NVD-CWE-Other

04 Feb 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-04 17:16

Updated : 2026-02-05 20:32


NVD link : CVE-2026-25052

Mitre link : CVE-2026-25052

CVE.ORG link : CVE-2026-25052


JSON object : View

Products Affected

n8n

  • n8n
CWE
CWE-367

Time-of-check Time-of-use (TOCTOU) Race Condition

NVD-CWE-Other