SB2026020957 - Remote code execution via Add Config operation in n8n



SB2026020957 - Remote code execution via Add Config operation in n8n

Published: February 9, 2026

Security Bulletin ID SB2026020957
Severity
Medium
Patch available
YES
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

Medium 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Inclusion of Functionality from Untrusted Control Sphere (CVE-ID: CVE-2025-65964)

The vulnerability allows a remote user to compromise the affected system.

The vulnerability exists due to the n8n Git node allows workflows to set arbitrary Git configuration values through the Add Config operation. When an attacker-controlled workflow sets core.hooksPath to a directory within the cloned repository containing a Git hook such as pre-commit, Git executes that hook during subsequent Git operations. Because Git hooks run as local system commands, this behavior can lead to arbitrary command execution on the underlying n8n host.


Remediation

Install update from vendor's website.