[CIVN-2026-0072] Remote Code Execution Vulnerability in n8n

By Published On: February 7, 2026

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Remote Code Execution Vulnerability in n8n 
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: HIGH
Software Affected
n8n versions prior to 1.123.17
n8n versions prior to 2.5.2
Overview
A vulnerability has been reported in n8n workflow automation platform which could allow an attacker to execute arbitrary code on the affected system.
 
Target Audience:
All end-user organizations responsible for deploying, securing, and maintaining n8n
Risk Assessment:
Very high risk of remote code execution and system compromise
Impact Assessment:
Potential for unauthorized access, full system takeover, exposure of credentials and sensitive data.
Description
n8n is an open-source workflow automation platform that enables users to design integrations using low-code components and JavaScript expressions.
This vulnerability exists in the n8n workflow automation platform due to insufficient validation within its JavaScript expression evaluation mechanism. An attacker could exploit this vulnerability by injecting specially crafted expressions into workflow parameters resulting in bypassing of security controls and escaping the restricted execution environment.
Successful exploitation of this vulnerability could allow the attacker to execute arbitrary code leading to full compromise of the affected n8n instance.
Workaround
Restrict workflow creation and editing permissions strictly to trusted and authorized users.
Deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation.
Solution
Apply appropriate security updates as mentioned in
https://n8n.io/legal/security/
Vendor Information
n8n
https://n8n.io/
References
 
https://github.com/n8n-io/n8n/security/advisories/GHSA-6cqr-8cfr-67f8
CVE Name
CVE-2026-25049
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=TAA2
—–END PGP SIGNATURE—–

Share this article