CVE-2026-25053: n8n: Command Injection enables RCE
CRITICALn8n is widely deployed as an AI agent orchestration platform and this 9.9 CVE gives any authenticated user—including low-privilege accounts—arbitrary OS command execution and file read on the host. Patch immediately to 1.123.10 or 2.5.0; treat all API keys, AI service credentials, and secrets stored on any n8n host as potentially compromised. If patching is not immediately possible, restrict workflow creation and modification to trusted administrators only.
Risk Assessment
Extremely high. CVSS 9.9 with Scope:Changed means blast radius extends beyond the n8n process—attackers can pivot to the underlying host and all connected services. Low complexity + low privilege + no user interaction makes this trivially exploitable by any authenticated user. n8n instances are frequently internet-exposed with privileged access to AI APIs (OpenAI, Anthropic), databases, and internal services through automation workflows, dramatically amplifying the effective impact.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| n8n | npm | — | No patch |
Do you use n8n? You're affected.
Severity & Risk
Attack Surface
Recommended Action
7 steps-
PATCH IMMEDIATELY
Upgrade to n8n 1.123.10 (v1 branch) or 2.5.0 (v2 branch)—no workaround substitutes for patching.
-
ROTATE ALL CREDENTIALS
Assume any secret accessible from the n8n host (AI API keys, DB passwords, SSH keys, Stripe/webhook secrets, .env vars) is compromised if patch was delayed.
-
RESTRICT PERMISSIONS
Limit workflow create/modify rights to trusted admins until patched.
-
NETWORK ISOLATION
Ensure n8n is not publicly exposed; place behind VPN or strict IP allowlist.
-
AUDIT LOGS
Review workflow creation and modification events for unauthorized or suspicious Git node usage in the period before patching.
-
HARDEN CONTAINER
Run n8n with minimal host filesystem access, read-only mounts, and dropped capabilities.
-
DETECTION
Alert on unexpected outbound connections from the n8n host and anomalous child process spawning (e.g., bash, sh, curl spawned by the n8n process).
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2026-25053?
n8n is widely deployed as an AI agent orchestration platform and this 9.9 CVE gives any authenticated user—including low-privilege accounts—arbitrary OS command execution and file read on the host. Patch immediately to 1.123.10 or 2.5.0; treat all API keys, AI service credentials, and secrets stored on any n8n host as potentially compromised. If patching is not immediately possible, restrict workflow creation and modification to trusted administrators only.
Is CVE-2026-25053 actively exploited?
No confirmed active exploitation of CVE-2026-25053 has been reported, but organizations should still patch proactively.
How to fix CVE-2026-25053?
1. PATCH IMMEDIATELY: Upgrade to n8n 1.123.10 (v1 branch) or 2.5.0 (v2 branch)—no workaround substitutes for patching. 2. ROTATE ALL CREDENTIALS: Assume any secret accessible from the n8n host (AI API keys, DB passwords, SSH keys, Stripe/webhook secrets, .env vars) is compromised if patch was delayed. 3. RESTRICT PERMISSIONS: Limit workflow create/modify rights to trusted admins until patched. 4. NETWORK ISOLATION: Ensure n8n is not publicly exposed; place behind VPN or strict IP allowlist. 5. AUDIT LOGS: Review workflow creation and modification events for unauthorized or suspicious Git node usage in the period before patching. 6. HARDEN CONTAINER: Run n8n with minimal host filesystem access, read-only mounts, and dropped capabilities. 7. DETECTION: Alert on unexpected outbound connections from the n8n host and anomalous child process spawning (e.g., bash, sh, curl spawned by the n8n process).
What systems are affected by CVE-2026-25053?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, RAG pipelines, LLM-connected workflows, automation hubs, model serving, training pipelines.
What is the CVSS score for CVE-2026-25053?
CVE-2026-25053 has a CVSS v3.1 base score of 9.9 (CRITICAL). The EPSS exploitation probability is 0.03%.
Technical Details
NVD Description
n8n is an open source workflow automation platform. Prior to versions 1.123.10 and 2.5.0, vulnerabilities in the Git node allowed authenticated users with permission to create or modify workflows to execute arbitrary system commands or read arbitrary files on the n8n host. This issue has been patched in versions 1.123.10 and 2.5.0.
Exploitation Scenario
An attacker compromises or registers a low-privilege n8n account via credential stuffing, phishing, or abuse of self-registration. They create a workflow using the Git node with crafted parameters that inject OS commands—for example, reading /proc/self/environ to dump environment variables containing OPENAI_API_KEY, ANTHROPIC_API_KEY, database connection strings, and Stripe webhook secrets. With full command execution, they deploy a reverse shell, exfiltrate the entire n8n workflow database (containing all automation logic and embedded credentials), and use stolen AI API keys to pivot into LLM providers and downstream AI services. In AI-heavy deployments the attacker gains access to RAG database credentials, vector store API keys, and all integrated AI service configurations with zero forensic footprint in the AI provider logs.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H References
Timeline
Related Vulnerabilities
CVE-2026-33663 10.0 n8n: member role steals plaintext HTTP credentials
Same package: n8n CVE-2026-33660 10.0 TensorFlow: type confusion NPD in tensor conversion
Same package: n8n CVE-2026-21858 10.0 n8n: Input Validation flaw enables exploitation
Same package: n8n CVE-2026-27577 9.9 n8n: Code Injection enables RCE
Same package: n8n CVE-2026-27494 9.9 n8n: security flaw enables exploitation
Same package: n8n
AI Threat Alert