Source: Ministry of education information & communication security contingency platform
"" "" ""
| Publication Number | TACERT-ANA-2026020605025656 | Publication Time | 2026/02/06 17:20 |
| Incident Type | ANA-Vulnerability Alert | Discovery Time | 2026/02/06 17:20 |
| Impact Level | Low | ||
| [Subject] 【Vulnerability Alert】CISA Adds Seven Known Exploited Vulnerabilities to the KEV Catalog (2026/01/26–2026/02/01) |
|||
|
[Content] This vulnerability allows an authenticated attacker with permission to create or modify workflows to exploit specially crafted workflow parameter expressions, thereby triggering unauthorized system commands on the n8n host during execution. |
|||
|
[Affected Platform] n8n versions prior to 2.5.2 (not including 2.5.2) |
|||
|
[Recommended Actions] n8n version 1.123.17 (including 1.123.17) or later n8n version 2.5.2 (including 2.5.2) or later |
|||
| [Reference] https://www.twcert.org.tw/tw/cp-169-10696-c7fdb-1.html |
|||