HomeN8nCVE-2025-61914

CVE-2025-61914

HIGH
7.3CVSS
Published: 2025-12-26
Updated: 2025-12-31
AI Analysis

Description

n8n is an open source workflow automation platform. Prior to version 1.114.0, a stored Cross-Site Scripting (XSS) vulnerability may occur in n8n when using the “Respond to Webhook” node. When this node responds with HTML content containing executable scripts, the payload may execute directly in the top-level window, rather than within the expected sandbox introduced in version 1.103.0. This behavior can enable a malicious actor with workflow creation permissions to execute arbitrary JavaScript in the context of the n8n editor interface. This issue has been patched in version 1.114.0. Workarounds for this issue involve restricting workflow creation and modification privileges to trusted users only, avoiding use of untrusted HTML responses in the “Respond to Webhook” node, and using an external reverse proxy or HTML sanitizer to filter responses that include executable scripts.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
Attack Vector
network
Complexity
low
Privileges
low
User Action
required
Scope
unchanged
Confidentiality
high
Integrity
high
Availability
none
Weaknesses
CWE-79

Metadata

Primary Vendor
N8N
Published
12/26/2025
Last Modified
12/31/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

n8n : n8n

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2025-61914 | HIGH Severity | CVEDatabase.com | CVEDatabase.com