Unsafe Dependency Resolution Affecting n8n-nodes-base package, versions <1.111.0


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.23% (46th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-JS-N8NNODESBASE-13786417
  • published31 Oct 2025
  • disclosed30 Oct 2025
  • creditAssaf Levkovich

Introduced: 30 Oct 2025

NewCVE-2025-62726  (opens in a new tab)
CWE-829  (opens in a new tab)

Amendment

This issue was found to be a duplicate. The original vulnerability with details can be found [here](https://security.snyk.io/vuln/via the Git Node component. An attacker can execute arbitrary code within the environment by cloning a repository containing a malicious pre-commit hook and triggering the commit operation. This can compromise the system and any connected credentials or workflows.

Note:

This is only exploitable if workflows utilize the Git Node to clone untrusted repositories.

Workaround

This vulnerability can be mitigated by avoiding cloning or interacting with untrusted repositories using the Git Node, or by disabling or restricting the use of the Git Node in workflows where repository content cannot be fully trusted.).

CVSS Base Scores

version 4.0
version 3.1