CVE-2026-25053: n8n: Command Injection enables RCE

CRITICAL
Published February 4, 2026
CISO Take

n8n is widely deployed as an AI agent orchestration platform and this 9.9 CVE gives any authenticated user—including low-privilege accounts—arbitrary OS command execution and file read on the host. Patch immediately to 1.123.10 or 2.5.0; treat all API keys, AI service credentials, and secrets stored on any n8n host as potentially compromised. If patching is not immediately possible, restrict workflow creation and modification to trusted administrators only.

Risk Assessment

Extremely high. CVSS 9.9 with Scope:Changed means blast radius extends beyond the n8n process—attackers can pivot to the underlying host and all connected services. Low complexity + low privilege + no user interaction makes this trivially exploitable by any authenticated user. n8n instances are frequently internet-exposed with privileged access to AI APIs (OpenAI, Anthropic), databases, and internal services through automation workflows, dramatically amplifying the effective impact.

Affected Systems

Package Ecosystem Vulnerable Range Patched
n8n npm No patch
186.5K OpenSSF 6.0 16 dependents Pushed 6d ago 40% patched ~3d to patch Full package profile →

Do you use n8n? You're affected.

Severity & Risk

CVSS 3.1
9.9 / 10
EPSS
0.0%
chance of exploitation in 30 days
Higher than 8% of all CVEs
Exploitation Status
No known exploitation
Sophistication
Trivial

Attack Surface

AV AC PR UI S C I A
AV Network
AC Low
PR Low
UI None
S Changed
C High
I High
A High

Recommended Action

7 steps
  1. PATCH IMMEDIATELY

    Upgrade to n8n 1.123.10 (v1 branch) or 2.5.0 (v2 branch)—no workaround substitutes for patching.

  2. ROTATE ALL CREDENTIALS

    Assume any secret accessible from the n8n host (AI API keys, DB passwords, SSH keys, Stripe/webhook secrets, .env vars) is compromised if patch was delayed.

  3. RESTRICT PERMISSIONS

    Limit workflow create/modify rights to trusted admins until patched.

  4. NETWORK ISOLATION

    Ensure n8n is not publicly exposed; place behind VPN or strict IP allowlist.

  5. AUDIT LOGS

    Review workflow creation and modification events for unauthorized or suspicious Git node usage in the period before patching.

  6. HARDEN CONTAINER

    Run n8n with minimal host filesystem access, read-only mounts, and dropped capabilities.

  7. DETECTION

    Alert on unexpected outbound connections from the n8n host and anomalous child process spawning (e.g., bash, sh, curl spawned by the n8n process).

CISA SSVC Assessment

Decision Track
Exploitation none
Automatable No
Technical Impact total

Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Art.15 - Accuracy, robustness and cybersecurity Article 15 - Accuracy, Robustness and Cybersecurity
ISO 42001
A.6.2.6 - AI system security
NIST AI RMF
GOVERN-1.7 - AI Supply Chain Risk Management GOVERN-6.1 - Policies and procedures for AI risk management MANAGE-2.2 - Mechanisms are in place and tested to manage AI risks
OWASP LLM Top 10
LLM02 - Insecure Output Handling LLM06 - Excessive Agency LLM07 - Insecure Plugin Design LLM08 - Excessive Agency

Frequently Asked Questions

What is CVE-2026-25053?

n8n is widely deployed as an AI agent orchestration platform and this 9.9 CVE gives any authenticated user—including low-privilege accounts—arbitrary OS command execution and file read on the host. Patch immediately to 1.123.10 or 2.5.0; treat all API keys, AI service credentials, and secrets stored on any n8n host as potentially compromised. If patching is not immediately possible, restrict workflow creation and modification to trusted administrators only.

Is CVE-2026-25053 actively exploited?

No confirmed active exploitation of CVE-2026-25053 has been reported, but organizations should still patch proactively.

How to fix CVE-2026-25053?

1. PATCH IMMEDIATELY: Upgrade to n8n 1.123.10 (v1 branch) or 2.5.0 (v2 branch)—no workaround substitutes for patching. 2. ROTATE ALL CREDENTIALS: Assume any secret accessible from the n8n host (AI API keys, DB passwords, SSH keys, Stripe/webhook secrets, .env vars) is compromised if patch was delayed. 3. RESTRICT PERMISSIONS: Limit workflow create/modify rights to trusted admins until patched. 4. NETWORK ISOLATION: Ensure n8n is not publicly exposed; place behind VPN or strict IP allowlist. 5. AUDIT LOGS: Review workflow creation and modification events for unauthorized or suspicious Git node usage in the period before patching. 6. HARDEN CONTAINER: Run n8n with minimal host filesystem access, read-only mounts, and dropped capabilities. 7. DETECTION: Alert on unexpected outbound connections from the n8n host and anomalous child process spawning (e.g., bash, sh, curl spawned by the n8n process).

What systems are affected by CVE-2026-25053?

This vulnerability affects the following AI/ML architecture patterns: agent frameworks, RAG pipelines, LLM-connected workflows, automation hubs, model serving, training pipelines.

What is the CVSS score for CVE-2026-25053?

CVE-2026-25053 has a CVSS v3.1 base score of 9.9 (CRITICAL). The EPSS exploitation probability is 0.03%.

Technical Details

NVD Description

n8n is an open source workflow automation platform. Prior to versions 1.123.10 and 2.5.0, vulnerabilities in the Git node allowed authenticated users with permission to create or modify workflows to execute arbitrary system commands or read arbitrary files on the n8n host. This issue has been patched in versions 1.123.10 and 2.5.0.

Exploitation Scenario

An attacker compromises or registers a low-privilege n8n account via credential stuffing, phishing, or abuse of self-registration. They create a workflow using the Git node with crafted parameters that inject OS commands—for example, reading /proc/self/environ to dump environment variables containing OPENAI_API_KEY, ANTHROPIC_API_KEY, database connection strings, and Stripe webhook secrets. With full command execution, they deploy a reverse shell, exfiltrate the entire n8n workflow database (containing all automation logic and embedded credentials), and use stolen AI API keys to pivot into LLM providers and downstream AI services. In AI-heavy deployments the attacker gains access to RAG database credentials, vector store API keys, and all integrated AI service configurations with zero forensic footprint in the AI provider logs.

Weaknesses (CWE)

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Timeline

Published
February 4, 2026
Last Modified
February 5, 2026
First Seen
February 4, 2026

Related Vulnerabilities