Open Redirect Vulnerability in n8n Workflow Automation Platform
CVE-2025-49592

4.6MEDIUM

Key Information:

Vendor

N8n-io

Status
Vendor
CVE Published:
26 June 2025

What is CVE-2025-49592?

n8n, a popular workflow automation platform, has an Open Redirect vulnerability in its login flow for versions prior to 1.98.0. This issue allows authenticated users to be redirected to untrusted and potentially harmful domains through crafted malicious URLs with misleading query parameters. This can lead to phishing attacks, where malicious actors imitate the n8n user interface on counterfeit domains, tricking users into entering sensitive information, including login credentials and 2FA tokens. If hosts of n8n expose the /signin endpoint to users, they may be at risk. The vulnerability has been addressed in version 1.98.0, which implements strict origin validation for redirect URLs. Users are urged to upgrade to this version or later to ensure their safety.

Affected Version(s)

n8n < 1.98.0

References

CVSS V3.1

Score:
4.6
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.
CVE-2025-49592 : Open Redirect Vulnerability in n8n Workflow Automation Platform