CVE-2025-61914 (CNNVD-202512-4826)
中文标题:
n8n 跨站脚本漏洞
英文标题:
n8n's Possible Stored XSS in "Respond to Webhook" Node May Execute Outside iframe Sandbox
漏洞描述
中文描述:
n8n是n8n开源的一个可扩展的工作流自动化工具。 n8n 1.114.0之前版本存在跨站脚本漏洞,该漏洞源于Respond to Webhook节点处理HTML内容时未正确沙箱化,可能导致具有工作流创建权限的攻击者在编辑器环境中执行任意JavaScript代码。
英文描述:
n8n is an open source workflow automation platform. Prior to version 1.114.0, a stored Cross-Site Scripting (XSS) vulnerability may occur in n8n when using the “Respond to Webhook” node. When this node responds with HTML content containing executable scripts, the payload may execute directly in the top-level window, rather than within the expected sandbox introduced in version 1.103.0. This behavior can enable a malicious actor with workflow creation permissions to execute arbitrary JavaScript in the context of the n8n editor interface. This issue has been patched in version 1.114.0. Workarounds for this issue involve restricting workflow creation and modification privileges to trusted users only, avoiding use of untrusted HTML responses in the “Respond to Webhook” node, and using an external reverse proxy or HTML sanitizer to filter responses that include executable scripts.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| n8n-io | n8n | < 1.114.0 | - | - |
cpe:2.3:a:n8n-io:n8n:<_1.114.0:*:*:*:*:*:*:*
|
| n8n | n8n | * | - | - |
cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.1 (cna)
HIGHCVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-61914 |
2025-12-27 03:42:49 | 2026-01-12 02:12:11 |
| NVD | nvd_CVE-2025-61914 |
2026-01-01 04:27:48 | 2026-01-12 02:27:56 |
| CNNVD | cnnvd_CNNVD-202512-4826 |
2026-01-11 06:15:04 | 2026-01-12 02:38:07 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 跨站脚本
- cnnvd_id: 未提取 -> CNNVD-202512-4826
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 2
- data_sources: ['cve'] -> ['cve', 'nvd']