We found results for “”
CVE-2026-25049
Good to know:
Date: February 4, 2026
n8n is an open source workflow automation platform. Prior to versions 1.123.17 and 2.5.2, an authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. This issue has been patched in versions 1.123.17 and 2.5.2.
Severity Score
Related Resources (6)
Severity Score
Weakness Type (CWE)
Improper Control of Dynamically-Managed Code Resources
CWE-913Top Fix
Upgrade Version
Upgrade to version n8n - 1.123.17;n8n - 2.5.2;https://github.com/n8n-io/n8n.git - n8n@2.5.2;https://github.com/n8n-io/n8n.git - n8n@1.123.17
CVSS v3.1
| Base Score: |
|
|---|---|
| Attack Vector (AV): | NETWORK |
| Attack Complexity (AC): | LOW |
| Privileges Required (PR): | LOW |
| User Interaction (UI): | NONE |
| Scope (S): | CHANGED |
| Confidentiality (C): | HIGH |
| Integrity (I): | HIGH |
| Availability (A): | HIGH |
Vulnerabilities
Projects
Contact Us


