Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

BIOSAFIRE advances naturally derived flame retardants using lignins and tannins

n8n critical flaw CVE-2026-25049 allows execution of system commands via malicious workflows

Malicious NGINX configuration enables massive web traffic hijacking campaign

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » n8n critical flaw CVE-2026-25049 allows execution of system commands via malicious workflows
Identity

n8n critical flaw CVE-2026-25049 allows execution of system commands via malicious workflows

userBy userFebruary 5, 2026No Comments1 Min Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Rabi LakshmananFebruary 5, 2026Workflow automation/vulnerabilities

A critical new security vulnerability has been disclosed in the n8n workflow automation platform that could be successfully exploited to execute arbitrary system commands.

This flaw, tracked as CVE-2026-25049 (CVSS score: 9.4), is due to improper sanitization that bypasses safety measures put in place to address CVE-2025-68613 (CVSS score: 9.9), another critical flaw patched by n8n in December 2025.

“Additional exploits in expression evaluation in n8n have been identified and patched in accordance with CVE-2025-68613,” n8n maintainers said in an advisory released Wednesday.

“An authenticated user with privileges to create or modify workflows could exploit a crafted expression in a workflow parameter to cause execution of unintended system commands on a host running n8n.”

This issue affects the following versions:

<1.123.17 (fixed in 1.123.17) <2.5.2 (fixed in 2.5.2)

Ten security researchers are credited with discovering the flaw, including Fatih Çelik, who reported the original bug CVE-2025-68613, Cris Staicu of Endor Labs, Eilon Cohen of Pillar Security, and Sandeep Kamble of SecureLayer7.

In a technical detail describing CVE-2025-68613 and CVE-2026-25049, Çelik said, “The second vulnerability is only a bypass of the initial fix, so it could be considered the same vulnerability,” adding how an attacker could bypass the n8n-style sandboxing mechanism and bypass security checks.

“An attacker creates a workflow using a publicly accessible webhook that does not have authentication enabled,” SecureLayer7 said. “By adding a single line of JavaScript using structured syntax, workflows can be exploited to execute system-level commands. Once exposed, anyone on the internet can trigger a webhook to execute commands remotely.”

Successful exploitation of this vulnerability could not only allow an attacker to compromise the server, steal credentials, and exfiltrate sensitive data, but it could also open an opportunity for the attacker to install persistent backdoors to facilitate long-term access.

The cybersecurity firm also noted that the severity of the flaw increases significantly when combined with n8n’s webhook functionality, allowing an attacker to create a workflow with a public webhook, add a remote code execution payload to a node within the workflow, and make the webhook publicly accessible once the workflow is activated.

Pillar’s report describes the issue as allowing attackers to steal API keys, cloud provider keys, database passwords, and OAuth tokens, access file systems and internal systems, pivot to connected cloud accounts, and hijack artificial intelligence (AI) workflows.

“The attack doesn’t require anything special. If you can create a workflow, you own the server,” Cohen said.

Endor Labs also revealed details about the vulnerability, stating that the issue is caused by a gap in n8n’s sanitization mechanism that allows security controls to be bypassed.

“This vulnerability is caused by a mismatch between TypeScript’s compile-time type system and JavaScript’s run-time behavior,” Staicu explained. “TypeScript enforces properties to be strings at compile time, but this enforcement is limited to values ​​that are present in the code during compilation.”

“TypeScript cannot enforce these type checks on values ​​created by an attacker at runtime. If an attacker creates a malicious expression at runtime, they could pass non-string values ​​(objects, arrays, symbols, etc.) that bypass sanitization checks completely.”

If immediate patching is not possible, we recommend following the workarounds below to minimize the impact of potential exploits.

Restrict workflow creation and editing privileges to fully trusted users Deploy n8n in a hardened environment with limited operating system permissions and network access

“This vulnerability shows why multiple layers of validation are important. Even if one layer (TypeScript type) seems powerful, additional runtime checks are required when processing untrusted input,” Endor Labs said. “Pay particular attention to sanitization functions during code reviews, and look for assumptions about input types that are not enforced at runtime.”

(This story was updated after publication to include additional insights published by security researcher Fatih Çelik.)


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleMalicious NGINX configuration enables massive web traffic hijacking campaign
Next Article BIOSAFIRE advances naturally derived flame retardants using lignins and tannins
user
  • Website

Related Posts

Malicious NGINX configuration enables massive web traffic hijacking campaign

February 5, 2026

Microsoft develops scanner to detect backdoors in open weight large-scale language models

February 4, 2026

DEAD#VAX malware campaign deploys AsyncRAT via VHD phishing files hosted on IPFS

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

BIOSAFIRE advances naturally derived flame retardants using lignins and tannins

n8n critical flaw CVE-2026-25049 allows execution of system commands via malicious workflows

Malicious NGINX configuration enables massive web traffic hijacking campaign

Sam Altman took a very harsh stance on Claude’s Super Bowl ad

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.