【資安漏洞預警】n8n存在重大資安漏洞(CVE-2026-25049)
[Security Vulnerability Alert] n8n has a critical cybersecurity vulnerability (CVE-2026-25049)

發布單位:圖資處數位服務組
日期範圍:2026/2/9 ~ 2026/8/9
 
發布單位:圖資處數位服務組
日期範圍:2026/2/9 ~ 2026/8/9
行政 行政公告
全體

轉發 台灣電腦網路危機處理暨協調中心 資安訊息警訊 TWCERTCC-200-202602-00000004

[內容說明]
n8n是一款開源工作流程自動化工具,透過視覺化拖拉介面串接多種應用程式,無需程式碼即可自動化重複性任務。
近期發布重大資安漏洞公告(CVE-2026-1470,CVSS 4.x:9.4),此漏洞允許經身分驗證且擁有建立或修改工作流程權限的攻擊者,可利用特製的工作流程參數表達式,在執行n8n主機上觸發未經授權的系統指令。

[影響平台]
n8n 1.123.17(不含)之前版本
n8n 2.5.2(不含)之前版本

[建議措施]
請更新至以下版本:
n8n 1.123.17(含)之後版本 n8n 2.5.2(含)之後版本

[參考資料]
1. https://www.twcert.org.tw/tw/cp-169-10696-c7fdb-1.html

Forwarded from Taiwan Computer Network Crisis Management and Coordination Center: Cybersecurity Alert TWCERTCC-200-202602-00000004

[Description]
n8n is an open-source workflow automation tool that uses a visual drag-and-drop interface to connect various applications, automating repetitive tasks without requiring code.

A major cybersecurity vulnerability announcement was recently released (CVE-2026-1470, CVSS 4.x: 9.4). This vulnerability allows an authenticated attacker with permissions to create or modify workflows to trigger unauthorized system commands on the n8n host using specially crafted workflow parameter expressions.

[Affected Platforms]
n8n versions prior to 1.123.17 (excluding 1.123.17)
n8n versions prior to 2.5.2 (excluding 2.5.2)

[Recommended Actions]
Please update to the following versions:
n8n versions 1.123.17 and later
n8n versions 2.5.2 and later

[References]
1. https://www.twcert.org.tw/tw/cp-169-10696-c7fdb-1.html


相關附件
system_update_alt參考資料
Top↑