Security researchers at Endor Labs disclosed a critical vulnerability in the n8n workflow automation platform that bypasses security fixes implemented in December 2025. The flaw, tracked as CVE-2026-25049 (CVSS 9.4), enables authenticated attackers to execute arbitrary system commands through malicious webhook workflows.

Vulnerability overview

AttributeDetails
CVECVE-2026-25049
CVSS score9.4 (Critical)
TypeExpression sandbox bypass → RCE
Root causeTypeScript/JavaScript type mismatch
BypassesCVE-2025-68613 patch (December 2025)
Affected versionsAll versions < 1.123.17 and < 2.5.2
Fixed versions1.123.17, 2.5.2
DiscovererEndor Labs (Cris Staicu)
Public disclosureFebruary 4, 2026

Timeline

DateEvent
December 19-20, 2025Vulnerability discovered and documented
December 20, 2025Responsible disclosure to n8n security team
December 2025CVE-2025-68613 patch released
January 2026n8n releases versions 1.123.17 and 2.5.2
February 4, 2026Public disclosure and CVE assignment
February 4, 2026Proof-of-concept published

Technical analysis

Root cause: Type system mismatch

The vulnerability exploits a fundamental difference between TypeScript’s compile-time type checking and JavaScript’s runtime behavior.

AspectTypeScriptJavaScript
Type enforcementCompile-time onlyRuntime dynamic
Property checksStatic analysisNo enforcement
Attacker inputNot analyzedFully controlled

Endor Labs researcher Cris Staicu explained:

“While TypeScript enforces that a property should be a string at compile time, this enforcement is limited to values present in the code during compilation. TypeScript cannot enforce these type checks on runtime attacker-produced values.”

Bypass mechanism

StageDescription
1Attacker crafts malicious expression at runtime
2Passes non-string values (objects, arrays, symbols)
3Values bypass sanitization check
4Expression sandbox escape achieved
5System command execution

Exploitation requirements

RequirementDetails
AuthenticationRequired (workflow creation access)
Webhook accessPublic webhook with no auth
Code complexitySingle line of JavaScript
Trigger methodHTTP request to webhook

Attack scenario

Step-by-step exploitation

StepAction
1Attacker creates workflow with public webhook
2Adds malicious JavaScript using destructuring syntax
3Exposes webhook to internet
4Sends crafted request to webhook URL
5Commands execute on n8n server

Impact of successful exploitation

CapabilityRisk
System command executionComplete server compromise
Credential theftAPI keys, OAuth tokens
Secret exfiltrationStored passwords, configuration
Lateral movementAccess to connected systems
Data manipulationWorkflow modification, data theft

Affected deployments

Exposure assessment

FactorRisk level
Self-hosted instancesHigh (if publicly accessible)
Cloud-hosted n8nManaged by provider
Internet-exposed webhooksCritical
Internal-only deploymentsModerate (insider threat)

Scale of exposure

MetricEstimate
Global n8n installations~100,000+
Potentially exposed serversThousands
Active exploitationNot yet observed

Relationship to previous vulnerabilities

This is the third major n8n vulnerability disclosed in recent months:

CVECVSSTypeDate
CVE-2026-2185810.0Content-Type confusion → RCEJanuary 2026
CVE-2025-686139.9Expression sandbox escapeDecember 2025
CVE-2026-250499.4Patch bypass → RCEFebruary 2026
CVE-2026-14709.9JavaScript with statement escapeFebruary 2026
CVE-2026-08638.5Python AttributeError.obj escapeFebruary 2026

The pattern suggests n8n’s sandboxing approach faces fundamental challenges in securely isolating dynamic code execution.

Remediation

Immediate actions

PriorityAction
CriticalUpgrade to n8n 1.123.17 or 2.5.2+
CriticalAudit public webhook configurations
HighReview workflow creation permissions
HighImplement network access controls

For organizations unable to patch immediately

WorkaroundPurpose
Restrict workflow creationLimit to trusted users only
Disable public webhooksRemove attack surface
Network segmentationIsolate n8n from critical systems
Reduce OS privilegesLimit damage from compromise

Verification steps

CheckMethod
Version verificationn8n --version or UI settings
Webhook auditReview all workflow triggers
Permission reviewCheck user roles and access
Network exposureScan for public n8n instances

Detection

Indicators of exploitation

IndicatorDetection method
Unusual webhook trafficWeb server logs
Process spawning from n8nEDR/process monitoring
Credential file accessFile access auditing
Outbound connectionsNetwork monitoring

Log analysis

Log sourceLook for
n8n execution logsUnusual expression patterns
System logsChild processes from n8n
Network logsUnexpected outbound traffic
Authentication logsUnauthorized workflow access

Recommendations

For n8n administrators

PriorityAction
CriticalApply patches immediately
HighAudit all webhook configurations
HighImplement principle of least privilege
MediumEnable comprehensive logging
OngoingMonitor for future n8n advisories

For security teams

PriorityAction
HighInventory all n8n deployments
HighAdd n8n to vulnerability management
MediumImplement detection rules
MediumReview automation platform security
OngoingTrack workflow automation attack surface

For development teams

PriorityAction
HighReview workflow permissions
HighValidate webhook authentication requirements
MediumAudit connected integrations
MediumDocument automation dependencies

Context

CVE-2026-25049 highlights a persistent challenge in securing dynamic code execution environments. The vulnerability demonstrates that patches addressing specific exploitation techniques may be bypassed through alternative approaches.

The TypeScript/JavaScript type mismatch at the root of this vulnerability reflects a broader architectural tension: TypeScript provides compile-time safety, but JavaScript’s runtime flexibility allows attackers to circumvent those protections with crafted inputs.

For organizations relying on n8n and similar workflow automation platforms, this disclosure reinforces several security principles:

Defense in depth: Sandboxing alone cannot guarantee security. Network isolation, permission restrictions, and monitoring provide additional protection layers.

Patch verification: When critical vulnerabilities are patched, security teams should monitor for bypass disclosures, as attackers actively seek alternative exploitation paths.

Automation platform risk: Tools that execute dynamic code—even with sandboxing—present inherent risks. Organizations should treat automation platforms as high-value targets requiring rigorous security controls.

The public availability of proof-of-concept code means exploitation attempts may increase. Organizations should prioritize patching and implement compensating controls where immediate updates are not feasible.