CVE-2026-25631

6.5 MEDIUM

📋 TL;DR

This vulnerability in n8n's HTTP Request node allows authenticated attackers to bypass credential domain validation and send requests with credentials to unintended domains. This could lead to credential exfiltration when wildcard domain patterns (like *.example.com) are configured. Only users with wildcard domain patterns in their credential settings are affected.

💻 Affected Systems

Products:
  • n8n
Versions: All versions prior to 1.121.0
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only affects users who have configured credentials with wildcard domain patterns (e.g., *.example.com) in the 'Allowed domains' setting.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could exfiltrate sensitive credentials from the n8n platform to attacker-controlled domains, potentially compromising other systems that use those credentials.

🟠

Likely Case

Credential leakage to unintended domains, potentially exposing API keys, authentication tokens, or other sensitive credentials stored in n8n.

🟢

If Mitigated

Limited impact if proper network segmentation and credential scoping are in place, with no sensitive credentials using wildcard patterns.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated access to n8n and specific credential configuration with wildcard domains.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.121.0 and later

Vendor Advisory: https://github.com/n8n-io/n8n/security/advisories/GHSA-2xcx-75h9-vr9h

Restart Required: Yes

Instructions:

1. Backup your n8n instance. 2. Update n8n to version 1.121.0 or later using your package manager or deployment method. 3. Restart the n8n service. 4. Verify the update was successful.

🔧 Temporary Workarounds

Remove wildcard domain patterns

all

Remove any wildcard domain patterns (e.g., *.example.com) from credential 'Allowed domains' settings and replace with specific domains.

Restrict credential access

all

Review and limit which users have access to credentials with domain restrictions.

🧯 If You Can't Patch

  • Review all credentials and remove wildcard domain patterns from 'Allowed domains' settings
  • Implement network controls to restrict outbound connections from n8n instances to only authorized domains

🔍 How to Verify

Check if Vulnerable:

Check n8n version and review if any credentials use wildcard domain patterns in 'Allowed domains' settings.

Check Version:

n8n --version or check package.json version field

Verify Fix Applied:

Confirm n8n version is 1.121.0 or later and test that credentials with wildcard domains now properly validate against intended domains.

📡 Detection & Monitoring

Log Indicators:

  • Unusual outbound HTTP requests from n8n to unexpected domains
  • Failed credential validation attempts

Network Indicators:

  • HTTP requests from n8n to domains not matching configured credential patterns

SIEM Query:

source="n8n" AND (http_request.method=* AND NOT http_request.domain IN (allowed_domains_list))

🔗 References

📤 Share & Export