n8n is a workflow automation platform. Before 1.106.0, a symlink traversal vulnerability was discovered in the Read/Write File node in n8n. While the node attempts to restrict access to sensitive directories and files, it does not properly account for symbolic links (symlinks). An attacker with the ability to create symlinks—such as by using the Execute Command node—could exploit this to bypass the intended directory restrictions and read from or write to otherwise inaccessible paths. Users of n8n.cloud are not impacted. Affected users should update to version 1.106.0 or later.
Metrics
Affected Vendors & Products
References
History
Thu, 21 Aug 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
N8n
N8n n8n |
|
Vendors & Products |
N8n
N8n n8n |
Wed, 20 Aug 2025 22:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | n8n is a workflow automation platform. Before 1.106.0, a symlink traversal vulnerability was discovered in the Read/Write File node in n8n. While the node attempts to restrict access to sensitive directories and files, it does not properly account for symbolic links (symlinks). An attacker with the ability to create symlinks—such as by using the Execute Command node—could exploit this to bypass the intended directory restrictions and read from or write to otherwise inaccessible paths. Users of n8n.cloud are not impacted. Affected users should update to version 1.106.0 or later. | |
Title | n8n has a symlink traversal vulnerability in "Read/Write File" node allows access to restricted files | |
Weaknesses | CWE-59 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-20T21:46:39.926Z
Updated: 2025-08-20T21:46:39.926Z
Reserved: 2025-08-19T15:16:22.915Z
Link: CVE-2025-57749

No data.

Status : Received
Published: 2025-08-20T22:15:29.670
Modified: 2025-08-20T22:15:29.670
Link: CVE-2025-57749

No data.