CVE-2025-55526: n8n-workflows: path traversal in download_workflow endpoint
CRITICAL PoC AVAILABLE CISA: ATTENDA critical unauthenticated directory traversal (CVSS 9.1) in n8n-workflows allows any remote attacker to read and overwrite arbitrary server files — no credentials, no user interaction required. If your AI automation stack runs this component exposed to any network, treat this as immediate compromise risk: workflow files routinely contain API keys, LLM provider tokens, and database credentials. Isolate the service behind a VPN or firewall now; no patch exists yet.
Risk Assessment
Extremely high exploitability: network-accessible, low complexity, zero authentication, zero user interaction (AV:N/AC:L/PR:N/UI:N). High confidentiality AND integrity impact means attackers can both exfiltrate sensitive data and tamper with workflow configurations. n8n-workflows is commonly internet-exposed in automation and AI agent deployments, making this broadly exploitable by unsophisticated threat actors. No patch or fixed version is currently available, extending the exposure window.
Affected Systems
Severity & Risk
Attack Surface
Recommended Action
6 steps-
IMMEDIATE
Restrict network access to the n8n-workflows API server — place behind VPN, firewall, or internal-only network. Block public exposure of port 8000/8080 (uvicorn default).
-
AUDIT
Check workflow configuration files and server logs for unexpected file access patterns (paths containing
../,%2e%2e, or absolute paths). -
ROTATE
Assume all secrets stored in workflow files on exposed instances are compromised — rotate API keys, DB credentials, webhook tokens.
-
MONITOR
Alert on HTTP requests to the download_workflow endpoint containing traversal sequences.
-
No official patch available — pin to a pre-vulnerability commit or replace with a hardened fork.
-
Consider running the API server in a minimal container with read-only filesystem mounts outside the workflow directory.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2025-55526?
A critical unauthenticated directory traversal (CVSS 9.1) in n8n-workflows allows any remote attacker to read and overwrite arbitrary server files — no credentials, no user interaction required. If your AI automation stack runs this component exposed to any network, treat this as immediate compromise risk: workflow files routinely contain API keys, LLM provider tokens, and database credentials. Isolate the service behind a VPN or firewall now; no patch exists yet.
Is CVE-2025-55526 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2025-55526, increasing the risk of exploitation.
How to fix CVE-2025-55526?
1. IMMEDIATE: Restrict network access to the n8n-workflows API server — place behind VPN, firewall, or internal-only network. Block public exposure of port 8000/8080 (uvicorn default). 2. AUDIT: Check workflow configuration files and server logs for unexpected file access patterns (paths containing `../`, `%2e%2e`, or absolute paths). 3. ROTATE: Assume all secrets stored in workflow files on exposed instances are compromised — rotate API keys, DB credentials, webhook tokens. 4. MONITOR: Alert on HTTP requests to the download_workflow endpoint containing traversal sequences. 5. No official patch available — pin to a pre-vulnerability commit or replace with a hardened fork. 6. Consider running the API server in a minimal container with read-only filesystem mounts outside the workflow directory.
What systems are affected by CVE-2025-55526?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, AI orchestration pipelines, workflow automation, LLM integration layers, API gateway / backend services.
What is the CVSS score for CVE-2025-55526?
CVE-2025-55526 has a CVSS v3.1 base score of 9.1 (CRITICAL). The EPSS exploitation probability is 0.63%.
Technical Details
NVD Description
n8n-workflows Main Commit ee25413 allows attackers to execute a directory traversal via the download_workflow function within api_server.py
Exploitation Scenario
An adversary targeting an organization's AI automation infrastructure scans for exposed n8n-workflows API servers. They send a crafted GET request: `GET /download_workflow?file=../../../../etc/environment` — the `download_workflow` function in `api_server.py` passes the unsanitized parameter directly to a file read operation, returning the server's environment file. The attacker iterates through known paths: `.env`, `config.json`, workflow JSON files — harvesting LLM provider API keys, Slack tokens, and database URIs. With integrity impact (I:H), the attacker then writes a malicious workflow definition that executes on the next scheduled run, establishing persistence inside the AI agent's execution context and potentially pivoting to connected services.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N References
- github.com/Zie619/n8n-workflows/issues/48 Exploit Issue
- github.com/fkie-cad/nvd-json-data-feeds Exploit
Timeline
Related Vulnerabilities
CVE-2026-33663 10.0 n8n: member role steals plaintext HTTP credentials
Same package: n8n CVE-2026-33660 10.0 TensorFlow: type confusion NPD in tensor conversion
Same package: n8n CVE-2026-21858 10.0 n8n: Input Validation flaw enables exploitation
Same package: n8n CVE-2026-27577 9.9 n8n: Code Injection enables RCE
Same package: n8n CVE-2026-27494 9.9 n8n: security flaw enables exploitation
Same package: n8n
AI Threat Alert