CVE-2025-68697 (CNNVD-202512-4822)
中文标题:
n8n 安全漏洞
英文标题:
Self-hosted n8n has Legacy Code node that enables arbitrary file read/write
漏洞描述
中文描述:
n8n是n8n开源的一个可扩展的工作流自动化工具。 n8n 2.0.0之前版本存在安全漏洞,该漏洞源于Code node可调用内部辅助函数,可能导致读取或写入主机文件系统。
英文描述:
n8n is an open source workflow automation platform. Prior to version 2.0.0, in self-hosted n8n instances where the Code node runs in legacy (non-task-runner) JavaScript execution mode, authenticated users with workflow editing access can invoke internal helper functions from within the Code node. This allows a workflow editor to perform actions on the n8n host with the same privileges as the n8n process, including: reading files from the host filesystem (subject to any file-access restrictions configured on the instance and OS/container permissions), and writing files to the host filesystem (subject to the same restrictions). This issue has been patched in version 2.0.0. Workarounds for this issue involve limiting file operations by setting N8N_RESTRICT_FILE_ACCESS_TO to a dedicated directory (e.g., ~/.n8n-files) and ensure it contains no sensitive data, keeping N8N_BLOCK_FILE_ACCESS_TO_N8N_FILES=true (default) to block access to .n8n and user-defined config files, and disabling high-risk nodes (including the Code node) using NODES_EXCLUDE if workflow editors are not fully trusted.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| n8n-io | n8n | < 2.0.0 | - | - |
cpe:2.3:a:n8n-io:n8n:<_2.0.0:*:*:*:*:*:*:*
|
| n8n | n8n | * | - | - |
cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.1 (cna)
HIGHCVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2025-68697 |
2025-12-27 03:42:49 | 2026-01-12 02:12:31 |
| NVD | nvd_CVE-2025-68697 |
2026-01-01 04:27:48 | 2026-01-12 02:28:14 |
| CNNVD | cnnvd_CNNVD-202512-4822 |
2026-01-11 06:15:03 | 2026-01-12 02:38:07 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202512-4822
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 2
- data_sources: ['cve'] -> ['cve', 'nvd']