Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. n8n
  4. ›
  5. CVE-2025-57749

CVE-2025-57749: n8n symlink traversal vulnerability in "Read/Write File" node allows access to restricted files

August 20, 2025 (updated August 21, 2025)

A symlink traversal vulnerability was discovered in the Read/Write File node in n8n. While the node attempts to restrict access to sensitive directories and files, it does not properly account for symbolic links (symlinks). An attacker with the ability to create symlinks—such as by using the Execute Command node—could exploit this to bypass the intended directory restrictions and read from or write to otherwise inaccessible paths. Users of n8n.cloud are not impacted.

References

  • github.com/advisories/GHSA-ggjm-f3g4-rwmm
  • github.com/n8n-io/n8n
  • github.com/n8n-io/n8n/commit/c2c3e08cdf33570d9051e659812cbfbdd3c077fd
  • github.com/n8n-io/n8n/pull/17735
  • github.com/n8n-io/n8n/security/advisories/GHSA-ggjm-f3g4-rwmm
  • nvd.nist.gov/vuln/detail/CVE-2025-57749

Code Behaviors & Features

Detect and mitigate CVE-2025-57749 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.106.0

Fixed versions

  • 1.106.0

Solution

Upgrade to version 1.106.0 or above.

Impact 6.5 MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-59: Improper Link Resolution Before File Access ('Link Following')
  • CWE-61: UNIX Symbolic Link (Symlink) Following

Source file

npm/n8n/CVE-2025-57749.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 23 Aug 2025 00:18:59 +0000.