Command Injection Affecting n8n-nodes-base package, versions <1.121.11>=2.0.0-rc.0 <2.5.2


Severity

Recommended
0.0
critical
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Command Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-N8NNODESBASE-15223110
  • published5 Feb 2026
  • disclosed4 Feb 2026
  • creditFatih Çelik, Simon Köck, Yadhu Krishna M

Introduced: 4 Feb 2026

CVE-2026-25053  (opens in a new tab)
CWE-78  (opens in a new tab)

How to fix?

Upgrade n8n-nodes-base to version 1.121.11, 2.5.2 or higher.

Overview

n8n-nodes-base is a Base nodes of n8n

Affected versions of this package are vulnerable to Command Injection via the Git node. An attacker can execute arbitrary system commands or read arbitrary files on the host by creating or modifying workflows as an authenticated user with the necessary permissions.

Workaround

This vulnerability can be mitigated by limiting workflow creation and editing permissions to fully trusted users, restricting or disabling access to the Git node if not essential, and deploying the application in a hardened environment with restricted operating system privileges and network access.

References

CVSS Base Scores

version 4.0
version 3.1