This is an Open Redirect (CWE-601) vulnerability in the login flow of n8n. Authenticated users can be redirected to untrusted, attacker-controlled domains after logging in, by crafting malicious URLs with a misleading redirect query parameter.
This may lead to:
The vulnerability affects anyone hosting n8n and exposing the /signin
endpoint to users.
The issue has been patched in 1.98.0. All users should upgrade to this version or later.
The fix introduces strict origin validation for redirect URLs, ensuring only same-origin or relative paths are allowed after login.
Patch commit: https://github.com/n8n-io/n8n/pull/16034
{ "cwe_ids": [ "CWE-601" ], "nvd_published_at": "2025-06-26T20:15:29Z", "github_reviewed_at": "2025-06-27T14:19:01Z", "github_reviewed": true, "severity": "MODERATE" }