n8n is a workflow automation platform. Prior to version 1.99.0, there is a denial of Service vulnerability in /rest/binary-data endpoint when processing empty filesystem URIs (filesystem:// or filesystem-v2://). This allows authenticated attackers to cause service unavailability through malformed filesystem URI requests, effecting the /rest/binary-data endpoint and n8n.cloud instances (confirmed HTTP/2 524 timeout responses). Attackers can exploit this by sending GET requests with empty filesystem URIs (filesystem:// or filesystem-v2://) to the /rest/binary-data endpoint, causing resource exhaustion and service disruption. This issue has been patched in version 1.99.0.
References
Link | Resource |
---|---|
https://github.com/n8n-io/n8n/commit/43c52a8b4f844e91b02e3cc9df92826a2d7b6052 | Patch |
https://github.com/n8n-io/n8n/pull/16229 | Patch |
https://github.com/n8n-io/n8n/security/advisories/GHSA-pr9r-gxgp-9rm8 | Third Party Advisory Patch |
Configurations
History
04 Sep 2025, 16:49
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:* | |
First Time |
N8n
N8n n8n |
|
References | () https://github.com/n8n-io/n8n/commit/43c52a8b4f844e91b02e3cc9df92826a2d7b6052 - Patch | |
References | () https://github.com/n8n-io/n8n/pull/16229 - Patch | |
References | () https://github.com/n8n-io/n8n/security/advisories/GHSA-pr9r-gxgp-9rm8 - Third Party Advisory, Patch |
03 Jul 2025, 15:13
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-03 13:15
Updated : 2025-09-04 16:49
NVD link : CVE-2025-49595
Mitre link : CVE-2025-49595
CVE.ORG link : CVE-2025-49595
JSON object : View
Products Affected
n8n
- n8n
CWE
CWE-400
Uncontrolled Resource Consumption