The security community has detected a serious failure in n8n, the workflow automation platform, which allows remote execution of commands on the server where the application runs if it is successfully exploited. The problem, recorded as CVE-2026-25049 and with a high score in the CVSS system (9.4), it is an evasion of sanitation controls in the evaluation of expressions that partially reverses a correction applied last year for vulnerability CVE-2025-68613 (CVSS 9.9).
N8n maintainers published a notice in GitHub that an authenticated user with permissions to create or edit flows can inject expressions specially built in flow parameters that end up escaping from the sandbox mechanism and causing the execution of host system commands. The official explanation and the corrected versions in the N8n safety notice in GitHub.

From the technical point of view, the root of the problem is the difference between the checks TypeScript does in compilation time and what happens in running time with JavaScript. As several research teams have explained, including Endor Labs, TypeScript can help identify that certain property should be a chain in the source code, but those guarantees disappear when performing values that an attacker dynamically introduces. Taking advantage of this, you can pass unexpected values (objects, arrays, symbols, etc.) that mockery the sanitation functions and allow you to leave the safe.
Independent researchers have published technical analyses that illustrate how evasion is achieved and how steps are chained to achieve remote execution. The outreach work includes a detailed breakdown of the techniques used and practical examples; one of these detailed analyses can be found in Fatih Çelik's research on the sequence of failures and bypass: n8n RCEs: A Tale of 4 Acts.
The risk is increased when combined with the functionality of n8n webhooks. If an attacker creates a flow with a public and unauthenticated webhold, you can insert the charge that causes command execution and, once the flow is activated, anyone who knows the endpoint can shoot it and run code on the server. Equipment like SecureLayer7 and Pillar Security have detailed impact scenarios that include API key theft, access to cloud secrets, lateral movement to connected accounts and taking control of workflows linked to artificial intelligence services.
n8n has released corrections in the affected branches; the versions containing the patches are 1.123.17 for the 1.x series and 2.5.2 for the 2.xseries. Update to a parched version should be the number one priority for any vulnerable deployment. If it is not possible to apply the update immediately, it is appropriate to take compensatory measures to reduce exposure: limit who can create and edit flows to a small group of trusted users, disable or protect public websites, and run n8n in environments with restricted system privileges and network rules to minimize damage in case of intrusion.
It is also important to audit existing flows and activity records to detect suspicious changes or newly created public endpoints. In systems that may have been compromised, the credentials and keys that have been available in the affected environment must be rotated and the access reviewed. Companies that depend on critical integrations and automations should prioritize this review and the parking campaign.

The chain of discovery of this vulnerability included contributions from several security teams and analysts, including Fatih Çelik, Cris Staicu de Endor Labs, Eilon Cohen de Pillar Security and Sandeep Kamble de SequreLayer7; N8n maintainers have publicly recognized them for their reports.
This episode highlights a classic but often ignored lesson: static checks of the type do not replace robust validations in running time when handling unreliable inputs. Organizations like OWASP have been insisting on the need for multiple layers of defence and the strict validation of inputs for years; general documentation on validation and entry control risks can be consulted in resources such as OWASP. To better understand why TypeScript does not avoid this type of exploits, the TypeScript project's own guide offers context on how your type system acts in compilation time but does not persist in the final bundle: TypeScript documentation.
In short, if you use n8n in production: first, update the parcheed versions as soon as possible. Then, it reviews permissions and exposure of webhooks, hardens the implementation environment and performs an audit of possible commitment indicators. If you need more technical information, the analysis of researchers and the notice of n8n are useful public resources to understand the scope and the means of operation: GitHub's notice, deep-dive de Fatih Çelik and the reports of the Endor Labs, SecureLayer7 and Pillar Security.
Related
More news on the same subject.

18-year-old Ukrainian youth leads a network of infostealers that violated 28,000 accounts and left $250,000 in losses
The Ukrainian authorities, in coordination with US agents. They have focused on an operation of infostealer which, according to the Ukrainian Cyber Police, was allegedly adminis...

The digital signature is in check: Microsoft dismands a service that turned malware into apparently legitimate software
Microsoft announced the disarticulation of a "malware-signing-as-a-service" operation that exploited its device signature system to convert malicious code into seemingly legitim...

A single GitHub workflow token opened the door to the software supply chain
A single GitHub workflow token failed in the rotation and opened the door. This is the central conclusion of the incident in Grafana Labs following the recent wave of malicious ...

Mini Shai-Hulud: the attack that turned the dependencies into mass intrusion vectors
Summary of the incident: GitHub investigates unauthorized access to internal repositories after the actor known as TeamPCP put the alleged source code and internal platform orga...

Security Alert: CVE-2026-45829 exposes ChromaDB to remote code execution without authentication
A critical failure in ChromaDB Python API - the popular vector base used for recovery during LLM inference - allows non-authenticated attackers to run arbitrary code on exposed ...

Fox Temper exposes the fragility of digital signature in the cloud
Microsoft's disclosure of the operation of "malware-signing-as-a-service" known as Fox Temper replaces in the center the most critical vulnerability of the modern software ecosy...

Trapdoor: the maldumping operation that turned Android apps into an automatic illicit income factory
Cybersecurity researchers have discovered an operation of maldumping and mobile advertising fraud named as Trapdoor, which turns legitimate Android application facilities into a...