CVE-2025-52554
JavaScript vulnerability analysis and mitigation

Overview

n8n, a workflow automation platform, was found to contain an authorization vulnerability (CVE-2025-52554) in the /rest/executions/:id/stop endpoint prior to version 1.99.1. The vulnerability was disclosed on July 3, 2025, and allows authenticated users to stop workflow executions that they do not own or that have not been shared with them (GitHub Advisory).

Technical details

The vulnerability stems from an improper authorization implementation in the workflow execution stop endpoint. While most API methods enforce user-scoped access to workflow execution IDs, the /stop endpoint failed to implement these checks. The vulnerability received a CVSS v3.1 base score of 4.3 (Moderate) with the vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N. The issue is classified as CWE-862 (Missing Authorization) (GitHub Advisory).

Impact

The vulnerability primarily affects environments where multiple users with varying trust levels share access to the same n8n instance, particularly those running long-running or time-sensitive workflows. Attackers can exploit this flaw to disrupt other users' workflow executions and cause denial of service for business-critical automations. The vulnerability allows attackers to guess or enumerate execution IDs, which are sequential and partially exposed via verbose error messages (GitHub Advisory).

Mitigation and workarounds

The vulnerability has been patched in n8n version 1.99.1. Users are strongly advised to upgrade to this version or later to ensure proper authorization checks are enforced before stopping workflow executions. For those unable to upgrade immediately, a workaround involves restricting access to the /rest/executions/:id/stop endpoint via reverse proxy or API gateway (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-55182CRITICAL10
  • JavaScriptJavaScript
  • react
NoYesDec 03, 2025
CVE-2025-66401CRITICAL9.8
  • JavaScriptJavaScript
  • mcp-watch
NoNoDec 01, 2025
CVE-2025-66412HIGH8.5
  • JavaScriptJavaScript
  • @angular/compiler
NoYesDec 01, 2025
CVE-2025-66415MEDIUM6.9
  • JavaScriptJavaScript
  • @fastify/reply-from
NoYesDec 01, 2025
CVE-2025-66405MEDIUM6.9
  • JavaScriptJavaScript
  • @portkey-ai/gateway
NoYesDec 01, 2025

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management