CVE-2026-25053

n8n is an open source workflow automation platform. Prior to versions 1.123.10 and 2.5.0, vulnerabilities in the Git node allowed authenticated users with permission to create or modify workflows to execute arbitrary system commands or read arbitrary files on the n8n host. This issue has been patched in versions 1.123.10 and 2.5.0.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:*
cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:*

History

05 Feb 2026, 20:32

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.9
References () https://github.com/n8n-io/n8n/security/advisories/GHSA-9g95-qf3f-ggrw - () https://github.com/n8n-io/n8n/security/advisories/GHSA-9g95-qf3f-ggrw - Patch, Vendor Advisory
CPE cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:*
First Time N8n n8n
N8n

04 Feb 2026, 17:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-04 17:16

Updated : 2026-02-05 20:32


NVD link : CVE-2026-25053

Mitre link : CVE-2026-25053

CVE.ORG link : CVE-2026-25053


JSON object : View

Products Affected

n8n

  • n8n
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')