Home

Description

n8n is an open source workflow automation platform. Versions 0.123.1 through 1.119.1 do not have adequate protections to prevent RCE through the project's pre-commit hooks. The Add Config operation allows workflows to set arbitrary Git configuration values, including core.hooksPath, which can point to a malicious Git hook that executes arbitrary commands on the n8n host during subsequent Git operations. Exploitation requires the ability to create or modify an n8n workflow using the Git node. This issue is fixed in version 1.119.2. Workarounds include excluding the Git Node (Docs) and avoiding cloning or interacting with untrusted repositories using the Git Node.

PUBLISHED Reserved 2025-11-18 | Published 2025-12-08 | Updated 2025-12-09 | Assigner GitHub_M




CRITICAL: 9.4CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-829: Inclusion of Functionality from Untrusted Control Sphere

Product status

>= 0.123.1, < 1.119.2
affected

References

github.com/...io/n8n/security/advisories/GHSA-wpqc-h9wp-chmq

github.com/...ommit/d5a1171f95f75def5c3ac577707ab913e22aef04

github.com/n8n-io/n8n/releases/tag/n8n@1.119.2

n8n-docs.teamlab.info/hosting/securing/blocking-nodes/

cve.org (CVE-2025-65964)

nvd.nist.gov (CVE-2025-65964)

Download JSON