Initiativen für
Als nationale Behörde für Cybersicherheit hat das ZCB mehrere Initiativen für bestimmte Zielgruppen entwickelt, die hier vorgestellt werden.
* Last update: 11/02/2026
* Affected products:
→ N8n for affected versions see link in the Source section.* Type:
- Unrestricted Upload of File with Dangerous Type
- Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
- Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS)
- Expression Escape Vulnerability
- Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
- Improper Input Validation
- Time-of-check Time-of-use (TOCTOU) Race Condition
- Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- Protection Mechanism Failure
- Exposure of Sensitive Information to an Unauthorized Actor
* CVE/CVSS:
- CVE-2025-61917 : CVSS 7.7 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N)
- CVE-2026-25115 : CVSS 9.4 (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)
- CVE-2026-25051 : CVSS 8.5 (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:N/SC:L/SI:L/SA:N)
- CVE-2026-25052 : CVSS 9.4 (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)
- CVE-2026-25053 : CVSS 9.4 (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)
- CVE-2026-25049 : CVSS 9.4 (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)
- CVE-2026-25054 : CVSS 8.5 (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N)
- CVE-2026-25055 : CVSS 7.1 (CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H)
- CVE-2026-25056 : CVSS 9.4 (CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H)
N8N Github
N8n is used for automating workflows between apps, services and APIs. These vulnerabilities could be chained together to compromise the confidentiality, integrity and availability of the n8n host system, critically degrading the service and exposing sensitive information.
Disclosed vulnerabilities affect multiple components and different versions of the n8n package. While most vulnerabilities require some level of knowledge of the underlying system or authenticated access, an attacker with both could compromise entire infrastructure by chaining the different vulnerabilities. A proof of concept for certain CVEs is also available online, supporting the weaponization of vulnerabilities.
Successful exploitation of vulnerabilities in n8n allows:
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority after thorough testing.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via https://ccb.belgium.be/cert/report-incident.
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.