CVE-2026-25631

n8n is an open source workflow automation platform. Prior to 1.121.0, there is a vulnerability in the HTTP Request node's credential domain validation allowed an authenticated attacker to send requests with credentials to unintended domains, potentially leading to credential exfiltration. This only might affect user who have credentials that use wildcard domain patterns (e.g., *.example.com) in the "Allowed domains" setting. This issue is fixed in version 1.121.0 and later.
References
Configurations

Configuration 1 (hide)

cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:*

History

19 Feb 2026, 17:51

Type Values Removed Values Added
CPE cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5
First Time N8n n8n
N8n
CWE CWE-522
References () https://github.com/n8n-io/n8n/security/advisories/GHSA-2xcx-75h9-vr9h - () https://github.com/n8n-io/n8n/security/advisories/GHSA-2xcx-75h9-vr9h - Third Party Advisory

06 Feb 2026, 21:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-06 21:16

Updated : 2026-02-19 17:51


NVD link : CVE-2026-25631

Mitre link : CVE-2026-25631

CVE.ORG link : CVE-2026-25631


JSON object : View

Products Affected

n8n

  • n8n
CWE
CWE-20

Improper Input Validation

CWE-522

Insufficiently Protected Credentials