Cyber Posture

CVE-2026-25052

Critical

Published: 04 February 2026

Published
04 February 2026
Modified
05 February 2026
KEV Added
Patch
CVSS Score 9.9 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0002 5.3th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-25052 is a critical-severity Time-of-check Time-of-use (TOCTOU) Race Condition (CWE-367) vulnerability in N8N N8N. Its CVSS base score is 9.9 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 5.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-3 (Access Enforcement) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

AC-3 mandates enforcement of approved access authorizations for system resources, directly addressing the flawed file access controls exploited to read sensitive host files.

prevent

SI-2 requires timely remediation of flaws through patching, such as upgrading to n8n versions 1.123.18 or 2.5.0 that fix the file access vulnerability.

prevent

AC-6 enforces least privilege, limiting workflow create/modify permissions to prevent excessive access enabling sensitive file reads.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1005 Data from Local System Collection
Adversaries may search local system sources, such as file systems, configuration files, local databases, virtual machine files, or process memory, to find files of interest and sensitive data prior to Exfiltration.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Vuln in public-facing n8n workflow app (TOCTOU file access flaw) directly enables remote exploitation of the application for arbitrary local file reads (T1190), facilitating collection of data/credentials from the host filesystem (T1005) including explicit unsecured credential files (T1552.001) leading to account takeover.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

n8n is an open source workflow automation platform. Prior to versions 1.123.18 and 2.5.0, a vulnerability in the file access controls allows authenticated users with permission to create or modify workflows to read sensitive files from the n8n host system.…

more

This can be exploited to obtain critical configuration data and user credentials, leading to complete account takeover of any user on the instance. This issue has been patched in versions 1.123.18 and 2.5.0.

Deeper analysisAI

CVE-2026-25052 is a critical vulnerability in the file access controls of n8n, an open source workflow automation platform. Affecting versions prior to 1.123.18 and 2.5.0, the flaw enables authenticated users to read sensitive files from the n8n host system. It has a CVSS v3.1 base score of 9.9 (AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) and is associated with CWE-367 (Time-of-check Time-of-use (TOCTOU) Race Condition) and NVD-CWE-Other.

An attacker with an authenticated account and permission to create or modify workflows can exploit this vulnerability remotely over the network with low complexity and no user interaction required. By leveraging the flawed controls, they can access critical configuration data and user credentials stored on the host, potentially achieving complete account takeover of any user on the n8n instance, including administrators.

The official advisory from the n8n GitHub Security Advisories (GHSA-gfvg-qv54-r4pc) confirms that the issue has been addressed in versions 1.123.18 and 2.5.0, recommending immediate upgrades to these or later releases for mitigation. No additional workarounds are specified in the provided details.

Details

CWE(s)

Affected Products

n8n
n8n
≤ 1.123.18 · 2.0.0 — 2.5.0

CVEs Like This One

CVE-2026-21858Same product: N8N N8N
CVE-2026-25053Same product: N8N N8N
CVE-2026-27494Same product: N8N N8N
CVE-2025-62726Same product: N8N N8N
CVE-2026-25055Same product: N8N N8N
CVE-2026-1470Same product: N8N N8N
CVE-2025-68613Same product: N8N N8N
CVE-2026-21877Same product: N8N N8N
CVE-2026-27493Same product: N8N N8N
CVE-2026-27497Same product: N8N N8N

References