CVE-2026-25051

5.4 MEDIUM

📋 TL;DR

An authenticated user with workflow creation/modification permissions in n8n can exploit a Cross-Site Scripting (XSS) vulnerability by crafting malicious workflows. When other users interact with these workflows, malicious scripts execute with same-origin privileges, potentially leading to session hijacking and account takeover. This affects all n8n instances running versions prior to 1.123.2.

💻 Affected Systems

Products:
  • n8n
Versions: All versions prior to 1.123.2
Operating Systems: All
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with workflow creation/modification permissions. The vulnerability exists in webhook response handling and HTTP endpoints where CSP sandbox protection fails.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover of administrators or other users, leading to data theft, privilege escalation, and full compromise of the n8n instance.

🟠

Likely Case

Session hijacking of users who interact with malicious workflows, allowing attackers to perform actions as those users and potentially access sensitive workflow data.

🟢

If Mitigated

Limited impact if proper authentication controls, user permission restrictions, and network segmentation are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access and knowledge of workflow creation. The vulnerability is in the CSP implementation, making exploitation straightforward once access is obtained.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.123.2

Vendor Advisory: https://github.com/n8n-io/n8n/security/advisories/GHSA-825q-w924-xhgx

Restart Required: Yes

Instructions:

1. Backup your n8n instance. 2. Update n8n to version 1.123.2 or later using your package manager or deployment method. 3. Restart the n8n service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Restrict workflow creation permissions

all

Limit workflow creation and modification permissions to trusted users only. Implement principle of least privilege.

Network segmentation

all

Isolate n8n instances from sensitive systems and implement strict network access controls.

🧯 If You Can't Patch

  • Implement strict user permission controls to limit who can create/modify workflows
  • Monitor for suspicious workflow creation/modification activities and implement user behavior analytics

🔍 How to Verify

Check if Vulnerable:

Check n8n version. If version is below 1.123.2, the system is vulnerable.

Check Version:

n8n --version or check package.json version field

Verify Fix Applied:

Verify n8n version is 1.123.2 or higher and test webhook response handling functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual workflow creation/modification patterns
  • Multiple failed authentication attempts followed by workflow changes
  • Suspicious webhook activity

Network Indicators:

  • Unexpected outbound connections from n8n instance
  • Unusual HTTP request patterns to webhook endpoints

SIEM Query:

source="n8n" AND (event="workflow_created" OR event="workflow_updated") | stats count by user

🔗 References

📤 Share & Export