Headline
GHSA-5vj6-wjr7-5v9f: n8n allows open redirects via the /signin endpoint
Impact
This is an Open Redirect (CWE-601) vulnerability in the login flow of n8n. Authenticated users can be redirected to untrusted, attacker-controlled domains after logging in, by crafting malicious URLs with a misleading redirect query parameter.
This may lead to:
- Phishing attacks by impersonating the n8n UI on lookalike domains (e.g., n8n.local.evil.com)
- Credential or 2FA theft if users are tricked into re-entering sensitive information
- Reputation risk due to the visual similarity between attacker-controlled domains and trusted ones
The vulnerability affects anyone hosting n8n and exposing the /signin endpoint to users.
Patches
The issue has been patched in 1.98.0. All users should upgrade to this version or later.
The fix introduces strict origin validation for redirect URLs, ensuring only same-origin or relative paths are allowed after login.
Patch commit: https://github.com/n8n-io/n8n/pull/16034
Skip to content
Navigation Menu
GitHub Copilot
Write better code with AI
GitHub Models New
Manage and compare prompts
GitHub Advanced Security
Find and fix vulnerabilities
Actions
Automate any workflow
Codespaces
Instant dev environments
* Issues
Plan and track work
* Code Review
Manage code changes
* Discussions
Collaborate outside of code
* Code Search
Find more, search less
Explore
- Learning Pathways
- Events & Webinars
- Ebooks & Whitepapers
- Customer Stories
- Partners
- Executive Insights
GitHub Sponsors
Fund open source developers
* The ReadME Project
GitHub community articles
Enterprise platform
AI-powered developer platform
- Pricing
Provide feedback
Saved searches****Use saved searches to filter your results more quickly
Sign up
Appearance settings
- GitHub Advisory Database
- GitHub Reviewed
- CVE-2025-49592
n8n allows open redirects via the /signin endpoint
Moderate severity GitHub Reviewed Published Jun 26, 2025 in n8n-io/n8n • Updated Jun 27, 2025
Affected versions
<= 1.97.0
Description
Impact
This is an Open Redirect (CWE-601) vulnerability in the login flow of n8n. Authenticated users can be redirected to untrusted, attacker-controlled domains after logging in, by crafting malicious URLs with a misleading redirect query parameter.
This may lead to:
- Phishing attacks by impersonating the n8n UI on lookalike domains (e.g., n8n.local.evil.com)
- Credential or 2FA theft if users are tricked into re-entering sensitive information
- Reputation risk due to the visual similarity between attacker-controlled domains and trusted ones
The vulnerability affects anyone hosting n8n and exposing the /signin endpoint to users.
Patches
The issue has been patched in 1.98.0.
All users should upgrade to this version or later.
The fix introduces strict origin validation for redirect URLs, ensuring only same-origin or relative paths are allowed after login.
Patch commit: n8n-io/n8n#16034
References
- GHSA-5vj6-wjr7-5v9f
- https://nvd.nist.gov/vuln/detail/CVE-2025-49592
- n8n-io/n8n#16034
- n8n-io/n8n@4865d1e
- https://github.com/n8n-io/n8n/releases/tag/n8n%401.98.0
Published to the GitHub Advisory Database
Jun 27, 2025
Last updated
Jun 27, 2025
EPSS score