CVE-2025-65964: n8n vulnerable to Remote Code Execution via Git Node Custom Pre-Commit Hook
(updated )
The n8n Git node allows workflows to set arbitrary Git configuration values through the Add Config operation. When an attacker-controlled workflow sets core.hooksPath to a directory within the cloned repository containing a Git hook such as pre-commit, Git executes that hook during subsequent Git operations. Because Git hooks run as local system commands, this behavior can lead to arbitrary command execution on the underlying n8n host.
Successful exploitation requires the ability to create or modify an n8n workflow that uses the Git node.
Affected versions: ≥ 0.123.1 and < 1.119.2
References
- github.com/advisories/GHSA-wpqc-h9wp-chmq
- github.com/n8n-io/n8n
- github.com/n8n-io/n8n/commit/d5a1171f95f75def5c3ac577707ab913e22aef04
- github.com/n8n-io/n8n/releases/tag/n8n%401.119.2
- github.com/n8n-io/n8n/security/advisories/GHSA-wpqc-h9wp-chmq
- n8n-docs.teamlab.info/hosting/securing/blocking-nodes/
- nvd.nist.gov/vuln/detail/CVE-2025-65964
Code Behaviors & Features
Detect and mitigate CVE-2025-65964 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →