Summary

Vulnerability Name Remote Code Execution due to Expression Escape in n8n (CVE-2026-25049)
Released on February 06, 2026
Affected Component n8n
Affected Version
n8n < 1.123.17
2.0.0 ≤ n8n < 2.5.2
Vulnerability Type Code execution
Exploitation Condition
1. User authentication: required.
2. Precondition: default configurations.
3. Trigger mode: remote.
Impact Exploitation difficulty: easy. Unauthorized attackers can exploit this vulnerability to execute arbitrary code. Severity: critical.
Official Solution Available

About the Vulnerability

Component Introduction

n8n is an open-source workflow automation platform that allows users to connect various applications, services, and APIs by dragging nodes on a visual interface. It enables users to construct complex automated processes without the need for extensive coding. The letter "n" in its name stands for "numerous", which indicates that n8n can connect countless tools for flexible integration.

Vulnerability Description

On February 06, 2026, Sangfor FarSight Labs received notification of the remote code execution vulnerability in n8n (CVE-2026-25049), classified as critical in threat level.

Specifically, n8n contains an expression escape vulnerability stemming from a defense gap in its JavaScript expression evaluation component. Attackers can bypass sandbox protection by combining arrow functions with the destructuring assignment syntax to obtain the function constructor, which may ultimately result in arbitrary code execution.

Affected Versions

The following n8n versions are affected:

n8n < 1.123.17

2.0.0 ≤ n8n < 2.5.2

Solutions

Remediation Solutions

Official Solutions

The latest versions have been officially released to fix the vulnerability. Affected users are advised to update n8n to the corresponding latest version as needed:

Download link: https://github.com/n8n-io/n8n/releases

Temporary Solutions

  1. Disable unused functional modules to reduce attack entry points.
  2. Follow the principle of least privilege to strictly control the scope of permissions for sensitive operations.
  3. Do not expose services to the Internet unless necessary, to limit the access sources to trusted ranges.
  4. Regularly update the system and components to secure versions so that known vulnerabilities can be patched at the earliest opportunity.

Sangfor Solutions

Proactive Vulnerability Detection

The following Sangfor service can proactively detect CVE-2026-25049 vulnerabilities and quickly identify vulnerability risks in batches in business scenarios:

  • Athena Managed Detection and Response (MDR): The corresponding detection solution will be released on March 30, 2026. The rule ID is SF-2026-01004.

Timeline

On February 06, 2026, Sangfor FarSight Labs received notification of the remote code execution vulnerability due to expression escape in n8n (CVE-2026-25049).

On February 06, 2026, Sangfor FarSight Labs released a vulnerability alert.

Reference

https://github.com/advisories/GHSA-6cqr-8cfr-67f8

Learn More

Sangfor FarSight Labs researches the latest cyber threats and unknown zero-day vulnerabilities, alerting customers to potential dangers to their organizations, and providing real-time solutions with actionable intelligence. Sangfor FarSight Labs works with other security vendors and the security community at large to identify and verify global cyber threats, providing fast and easy protection for customers.

Listen To This Post

Search

Related Articles

Security Feature Bypass in Microsoft Office (CVE-2026-21509)

Date : 27 Jan 2026
Read Now

Authentication Bypass in Oracle WebLogic Server Proxy Plug-in (CVE-2026-21962)

Date : 22 Jan 2026
Read Now

Command Injection in the phMonitor Service of Fortinet FortiSIEM (CVE-2025-64155)

Date : 15 Jan 2026
Read Now

See Other Product

Athena SASE - Secure Access Service Edge
Sangfor Athena NGFW - Next Generation Firewall
Sangfor Athena EPP - Modern Endpoint Protection Platform
Sangfor Athena NDR - Network Detection and Response
Cyber Command - NDR Platform
MDR TCO Calculator - User Input Page