A critical expression-escape vulnerability, CVE-2026-25049, in n8n allows authenticated users to execute arbitrary system commands by bypassing the platform’s expression sandbox. Users should upgrade immediately to patched releases to mitigate a high-impact flaw that evades prior fixes. #n8n #CVE-2026-25049
Keypoints
- CVE-2026-25049 allows authenticated users to execute arbitrary system commands via n8n expression evaluation.
- The vulnerability is rated critical with a CVSS 3.1 vector AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H and a score of 9.4.
- The flaw bypasses previous fixes for CVE-2025-68613 and was discovered during follow-up analysis.
- All n8n versions before 1.123.17 and 2.5.2 are affected; the issue was disclosed under GHSA-6cqr-8cfr-67f8 for the npm package.
- Immediate mitigation requires upgrading to 1.123.17 or 2.5.2; temporary workarounds include restricting workflow permissions and hardening the host.
Read More: https://thecyberexpress.com/critical-n8n-vulnerability-cve-2026-25049-rce/