CVE-2025-62726

HIGH LAB

N8n < 1.113.0 - Remote Code Execution

Title source: rule

Description

n8n is an open source workflow automation platform. Prior to 1.113.0, a remote code execution vulnerability exists in the Git Node component available in both Cloud and Self-Hosted versions of n8n. When a malicious actor clones a remote repository containing a pre-commit hook, the subsequent use of the Commit operation in the Git Node can inadvertently trigger the hook’s execution. This allows attackers to execute arbitrary code within the n8n environment, potentially compromising the system and any connected credentials or workflows. This vulnerability is fixed in 1.113.0.

Exploits (3)

github WORKING POC 2 stars
by adminlove520 · pythonpoc
https://github.com/adminlove520/CVE-Poc_All_in_One/tree/main/2025/CVE-2025-62726
nomisec WORKING POC
by baktistr · poc
https://github.com/baktistr/cve-2025-62726-poc
nomisec NO CODE
by Muzyli · poc
https://github.com/Muzyli/cve-2025-62726-malicious-repo

Scores

CVSS v3 8.8
EPSS 0.0013
EPSS Percentile 31.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Details

CWE
CWE-829
Status published
Products (2)
n8n/n8n < 1.113.0
npm/n8n 0 - 1.113.0npm
Published Oct 30, 2025
Tracked Since Feb 18, 2026