CVE-2025-62726
JavaScript vulnerability analysis and mitigation

Overview

CVE-2025-62726 affects n8n, an open source workflow automation platform. The vulnerability was discovered and disclosed on October 30, 2025. A remote code execution vulnerability exists in the Git Node component available in both Cloud and Self-Hosted versions of n8n prior to version 1.113.0. The vulnerability allows malicious actors to execute arbitrary code within the n8n environment through pre-commit hooks when cloning untrusted repositories (GitHub Advisory, NVD).

Technical details

When a malicious actor clones a remote repository containing a pre-commit hook, the subsequent use of the Commit operation in the Git Node can inadvertently trigger the hook's execution. The vulnerability has been assigned a CVSS v3.1 base score of 8.8 (High) with vector string CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H. The weakness is categorized as CWE-829: Inclusion of Functionality from Untrusted Control Sphere (GitHub Advisory).

Impact

This vulnerability allows attackers to execute arbitrary code within the n8n environment, potentially compromising the system and any connected credentials or workflows. All users with workflows that utilize the Git Node to clone untrusted repositories are affected (GitHub Advisory).

Mitigation and workarounds

The vulnerability was patched in version 1.113.0 with the introduction of a new environment variable N8N_GIT_NODE_DISABLE_BARE_REPOS. For self-hosted deployments, it is strongly recommended to set this variable to true. Prior to upgrading, users should avoid cloning or interacting with untrusted repositories using the Git Node and disable or restrict the use of the Git Node in workflows where repository content cannot be fully trusted (GitHub Advisory).

Additional resources


SourceThis report was generated using AI

Related JavaScript vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2026-22787HIGH8.7
  • JavaScriptJavaScript
  • html2pdf.js
NoYesJan 14, 2026
CVE-2026-22820MEDIUM6.3
  • JavaScriptJavaScript
  • outray
NoYesJan 14, 2026
CVE-2026-22819MEDIUM5.9
  • JavaScriptJavaScript
  • outray
NoYesJan 14, 2026
CVE-2026-22036LOW3.7
  • JavaScriptJavaScript
  • node-undici
NoYesJan 14, 2026
GHSA-73rr-hh4g-fpgxLOWN/A
  • JavaScriptJavaScript
  • diff
NoYesJan 14, 2026

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management