A serious security flaw showed up in n8ns Git node. They track it as CVE-2025-65964. It comes with a pretty high CVSS score of 9.4. The whole thing stems from a setup that lets workflows tweak Git config options any way they like. That even covers the core.hooksPath setting. Attackers take advantage of this to steer Git toward running bad hooks hidden in a pulled repo. In the end, that opens the door to running whatever code they want right on the n8n machine. To pull off the attack, someone needs permission to build or edit workflows involving the Git node. An inside person or a hacked account could provide that kind of entry. After they fiddle with core.hooksPath and slip in a nasty hook like pre-commit, the next Git task might fire off commands the system should not allow. Git hooks run without any real barriers around them. So the attacker ends up with strong hold over the server itself. This flaw hits n8n releases from greater than or equal to 0.123.1 up to less than 1.119.2. The team behind it rolled out a patch in version 1.119.2. If upgrading right away is not possible for some groups, they should really turn off the Git node or steer clear of it. That goes double for handling repos from sources you do not fully trust. It helps block any attempts to exploit the problem.
A large-scale phishing campaign has been identified leveraging RFQ (Request for Quotation) themed emails to distribute credential-stealing malware. Attackers disguise malicious HTM...
Two critical vulnerabilities in Progress ShareFile have been identified that can be chained to achieve pre-authentication remote code execution (RCE). Discovered by watchTowr resea...
The FBI has issued a warning highlighting potential security and privacy risks associated with widely used mobile applications developed by Chinese companies. These applications, a...