GHSA-wpqc-h9wp-chmq

Suggest an improvement
Source
https://github.com/advisories/GHSA-wpqc-h9wp-chmq
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/12/GHSA-wpqc-h9wp-chmq/GHSA-wpqc-h9wp-chmq.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-wpqc-h9wp-chmq
Aliases
Published
2025-12-08T21:30:07Z
Modified
2025-12-09T17:31:40.017214Z
Severity
  • 9.4 (Critical) CVSS_V4 - CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H CVSS Calculator
Summary
n8n vulnerable to Remote Code Execution via Git Node Custom Pre-Commit Hook
Details

Impact

The n8n Git node allows workflows to set arbitrary Git configuration values through the Add Config operation. When an attacker-controlled workflow sets core.hooksPath to a directory within the cloned repository containing a Git hook such as pre-commit, Git executes that hook during subsequent Git operations. Because Git hooks run as local system commands, this behavior can lead to arbitrary command execution on the underlying n8n host.

Successful exploitation requires the ability to create or modify an n8n workflow that uses the Git node.

Affected versions: ≥ 0.123.1 and < 1.119.2

Patches

This issue has been patched in n8n version 1.119.2.

All users running affected versions should upgrade to 1.119.2 or later.

Workarounds

If upgrading is not immediately possible, the following mitigations can reduce exposure:

  • Exclude the Git node (Docs).
  • Avoid cloning or interacting with untrusted repositories using the Git Node.
Database specific
{
    "cwe_ids": [
        "CWE-829"
    ],
    "github_reviewed": true,
    "nvd_published_at": "2025-12-09T00:15:48Z",
    "severity": "CRITICAL",
    "github_reviewed_at": "2025-12-08T21:30:07Z"
}
References

Affected packages

npm / n8n

Package

Affected ranges

Type
SEMVER
Events
Introduced
0.123.1
Fixed
1.119.2

Database specific

source
"https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2025/12/GHSA-wpqc-h9wp-chmq/GHSA-wpqc-h9wp-chmq.json"