New Critical n8n Flaw Allows Remote Code Execution

Critical n8n flaw enables remote command execution via webhooks, bypassing December 2025 patch; update immediately.

  • A critical flaw (CVE-2026-25049) in the automation platform n8n enables authenticated users to execute system commands, representing a bypass for a patch issued in December 2025.
  • An attacker can create a public webhook in a workflow to remotely trigger the exploit, potentially compromising the server and stealing sensitive credentials and data.
  • The vulnerability stems from a mismatch between TypeScript’s compile-time type checks and JavaScript’s runtime behavior, allowing malicious values to bypass sanitization.
  • Versions before 1.123.17 and 2.5.2 are affected, and users are urged to patch immediately or restrict workflow permissions and deploy in a hardened environment.

On February 5, 2026, security researchers disclosed a severe vulnerability in the popular n8n workflow automation platform that allows authenticated attackers to run arbitrary commands on the host system. This latest flaw, tracked as CVE-2026-25049 with a CVSS score of 9.4, is a direct bypass for safeguards implemented to fix an earlier critical issue, CVE-2025-68613.

- Advertisement -

According to the advisory released by n8n’s maintainers, the weakness lies in inadequate expression sanitization. Consequently, a user with permissions to create workflows could craft malicious expressions to trigger unintended command execution.

The vulnerability was identified by a group of ten researchers, including Fatih Çelik. In a technical analysis, Çelik explained that the new flaw is essentially the same vulnerability, as it escapes the n8n expression sandbox.

SecureLayer7 noted that pairing the bug with a public webhook makes it remotely exploitable. An attacker can therefore create a workflow, add a JavaScript payload, and wait for anyone online to trigger it.

Successful exploitation grants significant control. “The attack requires nothing special. If you can create a workflow, you can own the server,” said Pillar Security‘s Eilon Cohen, whose report detailed risks like stealing API keys and hijacking AI workflows.

- Advertisement -

Endor Labs’ Cris Staicu explained the root cause is a mismatch between TypeScript’s compile-time types and JavaScript’s runtime. Attackers can thus pass non-string values that bypass checks entirely.

The affected versions are below 1.123.17 and 2.5.2. Meanwhile, if patching is delayed, n8n recommends restricting workflow permissions and deploying in a hardened, restricted environment as a workaround.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Tycoon 2FA Phishing-As-A-Service Shut Down

Law enforcement dismantled Tycoon 2FA, a major Phishing-as-a-Service platform used in tens of thousands...

$1B Inflows Fuel Crypto Rebound As Bitcoin Surges Past $70K

Crypto funds saw $1 billion in weekly inflows, the largest since January, breaking a...

Senator: White House Staff May Have Profited Off Iran Strikes

Senator Chris Murphy alleges individuals with White House access placed six-figure bets on a...

Arthur Hayes Warns Bitcoin Rally Could Be a ‘Dead Cat Bounce’

Arthur Hayes of Maelstrom warned that Bitcoin’s rally might be a ‘dead cat bounce’...

A16z Seeks $2B for New Crypto Venture Fund

Despite a severe crypto downturn, Andreessen Horowitz is raising a new $2 billion crypto...

Must Read

How to Set Up a Simple Bitcoin Tip Jar for Your Site or Stream

QUICK LINKSWhat a tip jar is, in plain wordsWhat you needBuild a payment link that just worksAdd a QR code that actually scansWhere to...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!