CVE-2025-68949

n8n is an open source workflow automation platform. From 1.36.0 to before 2.2.0, the Webhook node’s IP whitelist validation performed partial string matching instead of exact IP comparison. As a result, an incoming request could be accepted if the source IP address merely contained the configured whitelist entry as a substring. This issue affected instances where workflow editors relied on IP-based access controls to restrict webhook access. Both IPv4 and IPv6 addresses were impacted. An attacker with a non-whitelisted IP could bypass restrictions if their IP shared a partial prefix with a trusted address, undermining the intended security boundary. This vulnerability is fixed in 2.2.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:*

History

No history.

Information

Published : 2026-01-13 19:16

Updated : 2026-01-16 18:47


NVD link : CVE-2025-68949

Mitre link : CVE-2025-68949

CVE.ORG link : CVE-2025-68949


JSON object : View

Products Affected

n8n

  • n8n
CWE
CWE-134

Use of Externally-Controlled Format String

CWE-284

Improper Access Control