Article Details

Original Article Text

Click to Toggle View

Critical n8n flaws disclosed along with public exploits. Multiple critical vulnerabilities in the popular n8n open-source workflow automation platform allow escaping the confines of the environment and taking complete control of the host server. Collectively tracked as CVE-2026-25049, the issues can be exploited by any authenticated user who can create or edit workflows on the platform to perform unrestricted remote code execution on the n8n server. Researchers at several cybersecurity companies reported the problems, which stem from n8n's sanitization mechanism and bypass the patch for CVE-2025-68613, another critical flaw addressed on December 20. According to Pillar Security, exploiting CVE-2026-25049 enables complete compromise of the n8n instance and could be leveraged to run arbitrary system commands on the server, steal all stored credentials, secrets (API keys, OAuth tokens), and sensitive configuration files. By exploiting the vulnerability, the researchers were also able to access the filesystem and internal systems, pivot to connected cloud accounts, and hijack AI workflows (intercept prompts, modify responses, redirect traffic). As n8n is a multi-tenant environment, accessing internal cluster services can potentially allow pivoting to other tenants’ data. “The attack requires nothing special. If you can create a workflow, you can own the server,” Pillar Security says in a report today. Pillar’s report describes the problem as incomplete AST-based sandboxing and explains that it arises from n8n’s weak sandboxing of user-written server-side JavaScript expressions in workflows. On December 21, 2025, they demonstrated a chained bypass to the n8n team, allowing sandbox escape and access to the Node.js global object, leading to RCE. A fix was implemented two days later, but upon further analysis, Pillar found it incomplete, and a second escape via a different mechanism using equivalent operations remained possible. n8n developers confirmed the bypass on December 30, and eventually, n8n released version 2.4.0 on January 12, 2026, addressing the issue. Researchers at Endor Labs also discovered sanitization bypasses and demonstrated the CVE-2026-25049 vulnerability with a simple proof-of-concept (PoC) exploit that achieves remote code execution. "In all versions prior to 2.5.2 and 1.123.17, the sanitization function assumes keys in property accesses are strings in attacker-controlled code," says Cristian Staicu of Endor Labs. However, while the check is reflected in TypeScript typings, it is not enforced at runtime, introducing a type-confusion vulnerability. This leads to bypassing the "sanitization controls entirely, enabling arbitrary code execution attacks." In a report today, researchers at SecureLayer7 provide the technical details that enabled them to achieve "server side JavaScript execution using the Function constructor." They discovered CVE-2026-25049 while analyzing CVE-2025-68613 and n8n's fix for it. It took more than 150 failed attempts to refine a successful bypass. SecureLayer7's report also includes a PoC exploit and detailed steps for the initial setup and creating a malicious workflow that leads to full server control. Recommended steps n8n users should update the platform to the most recent version (currently 1.123.17 and 2.5.2). Pillar security also recommends rotating the ‘N8N_ENCRYPTION_KEY’ and all credentials stored on the server, and reviewing workflows for suspicious expressions. If updating is not possible at the moment, the n8n team provides administrators with a workaround, which acts as a temporary mitigation and does not completely address the risk: Currently, there have not been any public reports about CVE-2026-25049 being exploited. However, n8n’s growing popularity appears to have caught the attention of cybercriminals in the context of the Ni8mare flaw (CVE-2026-21858). GreyNoise this week reported seeing potentially malicious activity targeting exposed n8n endpoints vulnerable to Ni8mare, logging at least 33,000 requests between January 27 and February 3. Although this probing could be due to research activity, scanning for the /proc filesystem indicates interest in post-exploitation potential. The future of IT infrastructure is here Modern IT infrastructure moves faster than manual workflows can handle. In this new Tines guide, learn how your team can reduce hidden manual delays, improve reliability through automated response, and build and scale intelligent workflows on top of tools you already use.

Daily Brief Summary

VULNERABILITIES // Critical Vulnerabilities in n8n Platform Allow Full Server Control

Multiple critical vulnerabilities in the n8n open-source workflow automation platform, tracked as CVE-2026-25049, enable authenticated users to execute remote code and take control of the host server.

Researchers identified flaws in n8n's sanitization mechanism, allowing attackers to bypass a previous patch and exploit server-side JavaScript expressions for unrestricted access.

Exploiting these vulnerabilities could lead to the theft of stored credentials, API keys, and sensitive configuration files, as well as unauthorized access to connected cloud accounts and AI workflows.

The n8n team released version 2.4.0 to address these issues, but further analysis revealed incomplete fixes, prompting additional updates to versions 1.123.17 and 2.5.2.

Security firms recommend updating to the latest n8n versions, rotating encryption keys, and reviewing workflows for suspicious activity to mitigate potential risks.

While no public exploits of CVE-2026-25049 have been reported, GreyNoise detected significant probing activity targeting exposed n8n endpoints, suggesting increased interest from cybercriminals.

Organizations using n8n should remain vigilant and apply recommended security measures to prevent unauthorized access and data breaches.