Home

Description

n8n is an open source workflow automation platform. Prior to 1.113.0, a remote code execution vulnerability exists in the Git Node component available in both Cloud and Self-Hosted versions of n8n. When a malicious actor clones a remote repository containing a pre-commit hook, the subsequent use of the Commit operation in the Git Node can inadvertently trigger the hook’s execution. This allows attackers to execute arbitrary code within the n8n environment, potentially compromising the system and any connected credentials or workflows. This vulnerability is fixed in 1.113.0.

PUBLISHED Reserved 2025-10-20 | Published 2025-10-30 | Updated 2025-10-31 | Assigner GitHub_M




HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-829: Inclusion of Functionality from Untrusted Control Sphere

Product status

< 1.113.0
affected

References

github.com/...io/n8n/security/advisories/GHSA-xgp7-7qjq-vg47

github.com/n8n-io/n8n/pull/19559

github.com/...ommit/5bf3db5ba84d3195bbe11bbd3c62f7086e090997

cve.org (CVE-2025-62726)

nvd.nist.gov (CVE-2025-62726)

Download JSON