CVE-2026-25049

CRITICAL

n8n <1.123.17, <2.5.2 - Command Injection

Title source: llm

Description

n8n is an open source workflow automation platform. Prior to versions 1.123.17 and 2.5.2, an authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. This issue has been patched in versions 1.123.17 and 2.5.2.

Exploits (2)

github WORKING POC 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-25049
nomisec WORKING POC
by otakuliu · poc
https://github.com/otakuliu/Expression-Sandbox-Escape-Simulation-Lab

Scores

CVSS v3 9.9
EPSS 0.0004
EPSS Percentile 10.8%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Classification

CWE
CWE-913
Status published

Affected Products (2)

n8n/n8n < 1.123.17
npm/n8n < 1.123.17npm

Timeline

Published Feb 04, 2026
Tracked Since Feb 18, 2026