Vibe Security Radar
Back to Vulnerabilities

CVE-2025-55526

Zie619/n8n-workflows
Aug 26, 2025CWE-22
Python
Verified by Unverified
Severity
CRITICAL9.1
Verdict
CONFIRMED
0.8 confidence
AI Tool
Claude CodeClaude Code
Language
Python

n8n-workflows Main Commit ee25413 allows attackers to execute a directory traversal via the download_workflow function within api_server.py

How AI Introduced This

Yes. The AI-authored commit ff958e486e1f8de4f7fd43c70ef357b8d6eaf433 created api_server.py and introduced `download_workflow` using attacker-controlled `filename` in `os.path.join("workflows", filename)` with no validation or canonicalization. A later human refactor preserved that unsafe path construction, but the vulnerable design originated in the Claude Code-generated commit.

Attribution Chain
Advisory
description search
Fix Commit
64f9f86— Zie619/n8n-workflows
git blame
api_server.py, workflow_db.py
Bug-Introducing Commit
Bug-Introducing Commits(1)

⚡ Complete workflow naming convention overhaul and documentation system optimization

console-1Jun 20, 2025api_server.py, workflow_db.pyBlame: 90%

Deep Verification

by investigator-override
CONFIRMED0.8
0 tool calls
80%

Yes. The AI-authored commit ff958e486e1f8de4f7fd43c70ef357b8d6eaf433 created api_server.py and introduced `download_workflow` using attacker-controlled `filename` in `os.path.join("workflows", filename)` with no validation or canonicalization. A later human refactor preserved that unsafe path construction, but the vulnerable design originated in the Claude Code-generated commit.

AI Signals(1)
Commitff958e4
Claude CodeCo-author trailerCo-Authored-By: Claude <noreply@anthropic.com>95%
Fix Commits(1)
64f9f86Zie619/n8n-workflowsdescription search
References(1)