HomeN8nCVE-2025-52478

CVE-2025-52478

HIGH
8.7CVSS
Published: 2025-08-19
Updated: 2025-09-03
AI Analysis

Description

n8n is a workflow automation platform. From 1.77.0 to before 1.98.2, a stored Cross-Site Scripting (XSS) vulnerability was identified in n8n, specifically in the Form Trigger node's HTML form element. An authenticated attacker can inject malicious HTML via an <iframe> with a srcdoc payload that includes arbitrary JavaScript execution. The attacker can also inject malicious Javascript by using <video> coupled <source> using an onerror event. While using iframe or a combination of video and source tag, this vulnerability allows for Account Takeover (ATO) by exfiltrating n8n-browserId and session cookies from authenticated users who visit a maliciously crafted form. Using these tokens and cookies, an attacker can impersonate the victim and change account details such as email addresses, enabling full control over the account—especially if 2FA is not enabled. Users should upgrade to version >= 1.98.2.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:N
Attack Vector
network
Complexity
low
Privileges
low
User Action
required
Scope
changed
Confidentiality
high
Integrity
high
Availability
none
Weaknesses
CWE-79

Metadata

Primary Vendor
N8N
Published
8/19/2025
Last Modified
9/3/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

n8n : n8n

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-52478 | HIGH Severity | CVEDatabase.com | CVEDatabase.com