Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows
嗯,用户让我用中文总结一下这篇文章,控制在100字以内,而且不需要特定的开头。首先,我需要仔细阅读文章内容,抓住关键点。 文章讲的是n8n工作流自动化平台发现了一个新的严重安全漏洞,CVE编号是CVE-2026-25049,CVSS评分9.4分。这个漏洞是由于之前修复的另一个漏洞CVE-2025-68613的防护措施不够完善导致的。攻击者可以利用这个漏洞执行任意系统命令,进而控制服务器、窃取敏感数据等。 影响版本包括1.123.17和2.5.2之前的版本。已经有多个安全研究人员发现了这个问题,并且提到了具体的攻击方式,比如利用公开的webhook和JavaScript代码来执行系统命令。 建议用户尽快升级到修复版本,并限制权限和部署环境。此外,文章还强调了多层验证的重要性。 总结的时候,我需要把这些关键点浓缩到100字以内。可能的结构是:平台名称、漏洞编号、CVSS评分、影响版本、攻击后果、研究人员发现、修复建议以及安全措施的重要性。 确保语言简洁明了,不使用复杂的术语,同时涵盖所有重要信息。 </think> n8n工作流自动化平台发现严重漏洞(CVE-2026-25049),CVSS评分9.4分。该漏洞源于防护措施不足,可被用于执行任意系统命令。影响版本包括<1.123.17和<2.5.2。攻击者可利用此漏洞控制服务器、窃取数据或安装后门。已有多名研究人员发现该问题,并建议用户升级至修复版本或采取限制权限等临时措施以降低风险。 2026-2-5 06:16:0 Author: thehackernews.com(查看原文) 阅读量:0 收藏

Workflow Automation / Vulnerability

A new, critical security vulnerability has been disclosed in the n8n workflow automation platform that, if successfully exploited, could result in the execution of arbitrary system commands.

The flaw, tracked as CVE-2026-25049 (CVSS score: 9.4), is the result of inadequate sanitization that bypasses safeguards put in place to address CVE-2025-68613 (CVSS score: 9.9), another critical defect that was patched by n8n in December 2025.

"Additional exploits in the expression evaluation of n8n have been identified and patched following CVE-2025-68613," n8n's maintainers said in an advisory released Wednesday.

"An authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n."

The issue affects the following versions -

  • <1.123.17 (Fixed in 1.123.17)
  • <2.5.2 (Fixed in 2.5.2)

As many as 10 security researchers, including Fatih Çelik, who reported the original bug CVE-2025-68613, as well as Endor Labs' Cris Staicu, Pillar Security's Eilon Cohen, and SecureLayer7's Sandeep Kamble, have been acknowledged for discovering the shortcoming.

"An attacker creates a workflow with a publicly accessible webhook that has no authentication enabled," SecureLayer7 said. "By adding a single line of JavaScript using destructuring syntax, the workflow can be abused to execute system-level commands. Once exposed, anyone on the internet can trigger the webhook and run commands remotely."

Successful exploitation of the vulnerability could allow an attacker to compromise the server, steal credentials, and exfiltrate sensitive data, not to mention open up opportunities for threat actors to install persistent backdoors to facilitate long-term access.

The cybersecurity company also noted that the severity of the flaw significantly increases when it's paired with n8n's webhook feature, permitting an adversary to create a workflow using a public webhook and add a remote code execution payload to a node in the workflow, causing the webhook to be publicly accessible once the workflow is activated.

Pillar's report has described the issue as permitting an attacker to steal API keys, cloud provider keys, database passwords, OAuth tokens, and access the filesystem and internal systems, pivot to connected cloud accounts, and hijack artificial intelligence (AI) workflows.

"The attack requires nothing special. If you can create a workflow, you can own the server," Cohen said.

Endor Labs, which also shared details of the vulnerability, said the problem arises from gaps in n8n's sanitization mechanisms that allow for bypassing security controls.

"The vulnerability arises from a mismatch between TypeScript's compile-time type system and JavaScript's runtime behavior," Staicu explained. "While TypeScript enforces that a property should be a string at compile time, this enforcement is limited to values that are present in the code during compilation."

"TypeScript cannot enforce these type checks on runtime attacker-produced values. When attackers craft malicious expressions at runtime, they can pass non-string values (such as objects, arrays, or symbols) that bypass the sanitization check entirely."

If immediate patching is not an option, users are advised to follow the workarounds below to minimize the impact of potential exploitation -

  • Restrict workflow creation and editing permissions to fully trusted users only
  • Deploy n8n in a hardened environment with restricted operating system privileges and network access

"This vulnerability demonstrates why multiple layers of validation are crucial. Even if one layer (TypeScript types) appears strong, additional runtime checks are necessary when processing untrusted input," Endor Labs said. "Pay special attention to sanitization functions during code review, looking for assumptions about input types that aren't enforced at runtime."

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


文章来源: https://thehackernews.com/2026/02/critical-n8n-flaw-cve-2026-25049.html
如有侵权请联系:admin#unsafe.sh