CVE-2026-25053
CRITICALN8n < 1.123.0 - OS Command Injection
Title source: ruleDescription
n8n is an open source workflow automation platform. Prior to versions 1.123.10 and 2.5.0, vulnerabilities in the Git node allowed authenticated users with permission to create or modify workflows to execute arbitrary system commands or read arbitrary files on the n8n host. This issue has been patched in versions 1.123.10 and 2.5.0.
Exploits (2)
github
WORKING POC
10 stars
by XiaomingX · pythonpoc
https://github.com/XiaomingX/data-cve-poc-py-v1/tree/main/2026/CVE-2026-25053
Scores
CVSS v3
9.9
EPSS
0.0002
EPSS Percentile
5.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Classification
CWE
CWE-78
Status
published
Affected Products (2)
n8n/n8n
< 1.123.0
npm/n8n
< 2.5.0npm
Timeline
Published
Feb 04, 2026
Tracked Since
Feb 18, 2026