{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-25049","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-01-28T14:50:47.888Z","datePublished":"2026-02-04T16:46:31.124Z","dateUpdated":"2026-02-05T14:36:17.819Z"},"containers":{"cna":{"title":"n8n Has an Expression Escape Vulnerability Leading to RCE","problemTypes":[{"descriptions":[{"cweId":"CWE-913","lang":"en","description":"CWE-913: Improper Control of Dynamically-Managed Code Resources","type":"CWE"}]}],"metrics":[{"cvssV4_0":{"attackVector":"NETWORK","attackComplexity":"LOW","attackRequirements":"NONE","privilegesRequired":"LOW","userInteraction":"NONE","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","subAvailabilityImpact":"HIGH","baseScore":9.4,"baseSeverity":"CRITICAL","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H","version":"4.0"}}],"references":[{"name":"https://github.com/n8n-io/n8n/security/advisories/GHSA-6cqr-8cfr-67f8","tags":["x_refsource_CONFIRM"],"url":"https://github.com/n8n-io/n8n/security/advisories/GHSA-6cqr-8cfr-67f8"},{"name":"https://github.com/n8n-io/n8n/commit/7860896909b3d42993a36297f053d2b0e633235d","tags":["x_refsource_MISC"],"url":"https://github.com/n8n-io/n8n/commit/7860896909b3d42993a36297f053d2b0e633235d"},{"name":"https://github.com/n8n-io/n8n/commit/936c06cfc1ad269a89e8ef7f8ac79c104436d54b","tags":["x_refsource_MISC"],"url":"https://github.com/n8n-io/n8n/commit/936c06cfc1ad269a89e8ef7f8ac79c104436d54b"}],"affected":[{"vendor":"n8n-io","product":"n8n","versions":[{"version":"< 1.123.17","status":"affected"},{"version":"< 2.5.2","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-02-04T16:46:31.124Z"},"descriptions":[{"lang":"en","value":"n8n is an open source workflow automation platform. Prior to versions 1.123.17 and 2.5.2, an authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. This issue has been patched in versions 1.123.17 and 2.5.2."}],"source":{"advisory":"GHSA-6cqr-8cfr-67f8","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-02-05T14:23:21.427676Z","id":"CVE-2026-25049","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-02-05T14:36:17.819Z"}}]}}