{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-61917","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2025-10-03T22:21:59.615Z","datePublished":"2026-02-04T16:46:42.633Z","dateUpdated":"2026-02-05T14:36:13.084Z"},"containers":{"cna":{"title":"n8n Unsafe Buffer Allocation Allows In-Process Memory Disclosure in Task Runner","problemTypes":[{"descriptions":[{"cweId":"CWE-668","lang":"en","description":"CWE-668: Exposure of Resource to Wrong Sphere","type":"CWE"}]},{"descriptions":[{"cweId":"CWE-200","lang":"en","description":"CWE-200: Exposure of Sensitive Information to an Unauthorized Actor","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":7.7,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/n8n-io/n8n/security/advisories/GHSA-49mx-fj45-q3p6","tags":["x_refsource_CONFIRM"],"url":"https://github.com/n8n-io/n8n/security/advisories/GHSA-49mx-fj45-q3p6"},{"name":"https://github.com/n8n-io/n8n/commit/2c4c2953199733c791f739a40879ae31ca129aba","tags":["x_refsource_MISC"],"url":"https://github.com/n8n-io/n8n/commit/2c4c2953199733c791f739a40879ae31ca129aba"}],"affected":[{"vendor":"n8n-io","product":"n8n","versions":[{"version":">= 1.65.0, < 1.114.3","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-02-04T16:46:42.633Z"},"descriptions":[{"lang":"en","value":"n8n is an open source workflow automation platform. From version 1.65.0 to before 1.114.3, the use of Buffer.allocUnsafe() and Buffer.allocUnsafeSlow() in the task runner allowed untrusted code to allocate uninitialized memory. Such uninitialized buffers could contain residual data from within the same Node.js process (for example, data from prior requests, tasks, secrets, or tokens), resulting in potential information disclosure. This issue has been patched in version 1.114.3."}],"source":{"advisory":"GHSA-49mx-fj45-q3p6","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-05T14:20:24.291895Z","id":"CVE-2025-61917","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-05T14:36:13.084Z"}}]}}