CVE-2026-25049
CRITICALn8n <1.123.17, <2.5.2 - Command Injection
Title source: llmDescription
n8n is an open source workflow automation platform. Prior to versions 1.123.17 and 2.5.2, an authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. This issue has been patched in versions 1.123.17 and 2.5.2.
Exploits (2)
github
WORKING POC
10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-25049
nomisec
WORKING POC
by otakuliu · poc
https://github.com/otakuliu/Expression-Sandbox-Escape-Simulation-Lab
Scores
CVSS v3
9.9
EPSS
0.0004
EPSS Percentile
10.8%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Classification
CWE
CWE-913
Status
published
Affected Products (2)
n8n/n8n
< 1.123.17
npm/n8n
< 1.123.17npm
Timeline
Published
Feb 04, 2026
Tracked Since
Feb 18, 2026