CVE-2025-61914
n8n · n8n
A high-severity vulnerability has been discovered in the n8n open source workflow automation platform.
Executive summary
A high-severity vulnerability has been discovered in the n8n open source workflow automation platform. Successful exploitation could allow a remote attacker to compromise the platform, potentially leading to unauthorized access to sensitive data, theft of credentials connected to other systems, and disruption of critical automated business processes.
Vulnerability
The vulnerability exists within a component of the n8n platform responsible for processing incoming data for workflows. An unauthenticated remote attacker can send a specially crafted HTTP request to a publicly exposed n8n instance. Due to insufficient input sanitization, this malicious request can be processed in a way that allows the attacker to execute arbitrary commands on the underlying server within the security context of the n8n application, or to access sensitive files on the server.
Business impact
This vulnerability is rated as High severity with a CVSS score of 7.3. Exploitation could have a significant business impact by compromising the integrity and confidentiality of automated workflows. An attacker could potentially steal sensitive credentials and API keys stored within n8n, access or modify data in connected systems (e.g., databases, CRMs, cloud services), or disrupt critical business processes that rely on n8n for automation. This could lead to a significant data breach, financial loss, and reputational damage.
Remediation
Immediate Action: Apply vendor security updates immediately across all affected n8n instances. After patching, it is critical to monitor for exploitation attempts and review access logs for any anomalous activity that may have occurred prior to the patch being applied, such as unusual requests or outbound connections.
Proactive Monitoring: Security teams should configure monitoring to detect and alert on suspicious activity targeting n8n instances. This includes monitoring web application and server logs for malformed HTTP requests, particularly those containing command-line syntax or path traversal sequences. Monitor for unexpected outbound network connections originating from the n8n server, which could indicate a successful compromise.
Compensating Controls: If patching cannot be performed immediately, deploy a Web Application Firewall (WAF) with rules specifically designed to inspect and block malicious payloads targeting n8n endpoints. Restrict network access to the n8n management interface and API, allowing connections only from trusted IP address ranges. Implement strict egress filtering on the host server to prevent it from establishing unauthorized outbound connections.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Due to the High severity (CVSS 7.3) of this vulnerability and its potential impact on critical business systems, immediate action is strongly recommended. Although it is not yet known to be exploited in the wild, the risk of compromise is significant. Organizations using the n8n platform should treat the patching of this vulnerability as a high priority to prevent potential data breaches and operational disruption.