Home

Description

n8n is a workflow automation platform. Before 1.106.0, a symlink traversal vulnerability was discovered in the Read/Write File node in n8n. While the node attempts to restrict access to sensitive directories and files, it does not properly account for symbolic links (symlinks). An attacker with the ability to create symlinks—such as by using the Execute Command node—could exploit this to bypass the intended directory restrictions and read from or write to otherwise inaccessible paths. Users of n8n.cloud are not impacted. Affected users should update to version 1.106.0 or later.

PUBLISHED Reserved 2025-08-19 | Published 2025-08-20 | Updated 2025-08-21 | Assigner GitHub_M




MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-59: Improper Link Resolution Before File Access ('Link Following')

Product status

< 1.106.0
affected

References

github.com/...io/n8n/security/advisories/GHSA-ggjm-f3g4-rwmm

github.com/n8n-io/n8n/pull/17735

cve.org (CVE-2025-57749)

nvd.nist.gov (CVE-2025-57749)

Download JSON