New Critical n8n Flaw Allows Remote Code Execution

Critical n8n flaw enables remote command execution via webhooks, bypassing December 2025 patch; update immediately.

  • A critical flaw (CVE-2026-25049) in the automation platform n8n enables authenticated users to execute system commands, representing a bypass for a patch issued in December 2025.
  • An attacker can create a public webhook in a workflow to remotely trigger the exploit, potentially compromising the server and stealing sensitive credentials and data.
  • The vulnerability stems from a mismatch between TypeScript’s compile-time type checks and JavaScript’s runtime behavior, allowing malicious values to bypass sanitization.
  • Versions before 1.123.17 and 2.5.2 are affected, and users are urged to patch immediately or restrict workflow permissions and deploy in a hardened environment.

On February 5, 2026, security researchers disclosed a severe vulnerability in the popular n8n workflow automation platform that allows authenticated attackers to run arbitrary commands on the host system. This latest flaw, tracked as CVE-2026-25049 with a CVSS score of 9.4, is a direct bypass for safeguards implemented to fix an earlier critical issue, CVE-2025-68613.

- Advertisement -

According to the advisory released by n8n’s maintainers, the weakness lies in inadequate expression sanitization. Consequently, a user with permissions to create workflows could craft malicious expressions to trigger unintended command execution.

The vulnerability was identified by a group of ten researchers, including Fatih Çelik. In a technical analysis, Çelik explained that the new flaw is essentially the same vulnerability, as it escapes the n8n expression sandbox.

SecureLayer7 noted that pairing the bug with a public webhook makes it remotely exploitable. An attacker can therefore create a workflow, add a JavaScript payload, and wait for anyone online to trigger it.

Successful exploitation grants significant control. “The attack requires nothing special. If you can create a workflow, you can own the server,” said Pillar Security‘s Eilon Cohen, whose report detailed risks like stealing API keys and hijacking AI workflows.

- Advertisement -

Endor Labs’ Cris Staicu explained the root cause is a mismatch between TypeScript’s compile-time types and JavaScript’s runtime. Attackers can thus pass non-string values that bypass checks entirely.

The affected versions are below 1.123.17 and 2.5.2. Meanwhile, if patching is delayed, n8n recommends restricting workflow permissions and deploying in a hardened, restricted environment as a workaround.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Saylor: Most Investors Prefer 10% Bank Over Bitcoin

MicroStrategy's Michael Saylor argues that most retail investors would prefer a stable 10% return...

Bitcoin Rallies Above $66,000 With Stocks, ETFs Inflow

Bitcoin surged above $66,000 on Wednesday, following a recovery in the US stock market.Bitcoin...

Former Defense Contractor Jailed for Selling Zero-Day Exploits

Former L3Harris manager Peter Williams sentenced to over seven years for stealing eight zero-day...

Madagascar Deepens BRICS Ties With Energy, Military Pivot

Madagascar’s interim president met with Vladimir Putin in Moscow, cementing the country's strategic alignment...

Crypto Exchanges Launch Rival Tokenized Stock Platforms

Coinbase, Binance, and Kraken launched competing tokenized stock products on Tuesday, intensifying competition for...

Must Read

Sushiswap vs Uniswap, What are the differences between these dex?

It's no secret that the world of decentralized exchanges has exploded in recent years. Many of you are probably wondering what the difference is...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!