CVE-2026-25053

CRITICAL

N8n < 1.123.0 - OS Command Injection

Title source: rule

Description

n8n is an open source workflow automation platform. Prior to versions 1.123.10 and 2.5.0, vulnerabilities in the Git node allowed authenticated users with permission to create or modify workflows to execute arbitrary system commands or read arbitrary files on the n8n host. This issue has been patched in versions 1.123.10 and 2.5.0.

Exploits (2)

github WORKING POC 10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-25053
nomisec WRITEUP 1 stars
by yadhukrishnam · poc
https://github.com/yadhukrishnam/CVE-2026-25053

Scores

CVSS v3 9.9
EPSS 0.0002
EPSS Percentile 5.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Classification

CWE
CWE-78
Status published

Affected Products (2)

n8n/n8n < 1.123.0
npm/n8n < 2.5.0npm

Timeline

Published Feb 04, 2026
Tracked Since Feb 18, 2026