Exclusive Webinar: Beyond the Perimeter – How to See Every Threat in Hybrid Networks

CVE-2026-25049

Critical Sandbox Escape in n8n via Type Confusion and AST Bypass: CVE-2026-25049 Decoded

CVSS Gauge
CVSS Needle

Summary

CVE-2026-25049 is a critical n8n flaw letting authenticated users escape the JavaScript sandbox to run arbitrary commands. It can give full server control, access to credentials, files, and workflows. Fixed in versions 1.123.17 and 2.5.2—update immediately and rotate credentials.

Urgent Actions Required

Which Systems Are Vulnerable to CVE-2026-25049?

Technical Overview

How Does the CVE-2026-25049 Exploit Work?

The attack typically follows these steps:

CVE-2026-25049

What Causes CVE-2026-25049?

Vulnerability Root Cause:

CVE-2026-25049 is caused by flaws in n8n’s sandbox, allowing authenticated users to run arbitrary code and fully compromise the server.

How Can You Mitigate CVE-2026-25049?

If immediate patching is delayed or not possible:

  • Restrict workflow creation and modification privileges to trusted users only.
  • Audit and delete workflows with suspicious JavaScript, especially using bracket notation or system objects.
  • Rotate the N8N_ENCRYPTION_KEY and regenerate all stored credentials to prevent misuse.
  • Operate n8n in an isolated environment with minimal system privileges and limited network access.
  • Continuously monitor workflow changes and execution logs for unexpected behavior or command execution patterns.

Which Assets and Systems Are at Risk?

Will Patching CVE-2026-25049 Cause Downtime?

Patch application impact: Low. Upgrading to n8n 1.123.17 or 2.5.2 typically requires just a service restart, causing minimal downtime.

Mitigation (if immediate patching is not possible): Limit workflow editing to trusted users, rotate credentials and N8N_ENCRYPTION_KEY, and run n8n with restricted privileges. These reduce risk but do not fully fix the vulnerability.

How Can You Detect CVE-2026-25049 Exploitation?

Exploitation Signatures:

Monitor for workflows containing unusual or unexpected JavaScript expressions, especially those attempting to access the constructor or the Function object. Look for expression nodes that interact with system-level modules like child_process or attempt file access (e.g., /etc/passwd).

Indicators of Compromise (IOCs/IOAs):

Behavioral Indicators:

Alerting Strategy:

Remediation & Response

CVSS Breakdown Table

MetricValue Description
Base Score9.4Critical severity indicating high impact and exploitability
Attack Vector NetworkExploitable remotely over the network without local access
Attack ComplexityLowExploit does not require special conditions; straightforward
Attack RequirementsNoneNo special conditions or prerequisites needed beyond access to workflow creation/editing
Privileges RequiredLowRequires a user account with permission to create or modify workflows
User InteractionNoneNo end-user action needed to trigger the exploit
Vulnerable System ConfidentialityHighExploit can disclose sensitive information, including stored credentials
Vulnerable System IntegrityHighExploit allows arbitrary code execution and modification of workflows or system files
Vulnerable System AvailabilityHighExploit can compromise server availability and system operations
Subsequent System ConfidentialityHighExploit can lead to the disclosure of data in connected systems and services
Subsequent System IntegrityHighExploit can impact the integrity of downstream services, workflows, or AI tasks
Subsequent System AvailabilityHighExploit can affect the availability of connected systems or automation workflows

Related Readings

One Platform for All Adversaries

See Fidelis in action. Learn how our fast and scalable platforms provide full visibility, deep insights, and rapid response to help security teams across the World protect, detect, respond, and neutralize advanced cyber adversaries.