CVE-2025-65964 PUBLISHED

n8n Vulnerable to Remote Code Execution via Git Node Custom Pre-Commit Hook

Assigner: GitHub_M
Reserved: 18.11.2025 Published: 08.12.2025 Updated: 09.12.2025

n8n is an open source workflow automation platform. Versions 0.123.1 through 1.119.1 do not have adequate protections to prevent RCE through the project's pre-commit hooks. The Add Config operation allows workflows to set arbitrary Git configuration values, including core.hooksPath, which can point to a malicious Git hook that executes arbitrary commands on the n8n host during subsequent Git operations. Exploitation requires the ability to create or modify an n8n workflow using the Git node. This issue is fixed in version 1.119.2. Workarounds include excluding the Git Node (Docs) and avoiding cloning or interacting with untrusted repositories using the Git Node.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
CVSS Score: 9.4

Product Status

Vendor n8n-io
Product n8n
Versions
  • Version >= 0.123.1, < 1.119.2 is affected

References

Problem Types

  • CWE-829: Inclusion of Functionality from Untrusted Control Sphere CWE