{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-05T15:07:02.570","vulnerabilities":[{"cve":{"id":"CVE-2025-61917","sourceIdentifier":"security-advisories@github.com","published":"2026-02-04T17:16:08.820","lastModified":"2026-02-18T17:46:40.833","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"n8n is an open source workflow automation platform. From version 1.65.0 to before 1.114.3, the use of Buffer.allocUnsafe() and Buffer.allocUnsafeSlow() in the task runner allowed untrusted code to allocate uninitialized memory. Such uninitialized buffers could contain residual data from within the same Node.js process (for example, data from prior requests, tasks, secrets, or tokens), resulting in potential information disclosure. This issue has been patched in version 1.114.3."},{"lang":"es","value":"n8n es una plataforma de automatización de flujos de trabajo de código abierto. Desde la versión 1.65.0 hasta antes de la 1.114.3, el uso de Buffer.allocUnsafe() y Buffer.allocUnsafeSlow() en el ejecutor de tareas permitió que código no confiable asignara memoria no inicializada. Dichos búferes no inicializados podrían contener datos residuales del mismo proceso de Node.js (por ejemplo, datos de solicitudes anteriores, tareas, secretos o tokens), lo que resultaría en una potencial revelación de información. Este problema ha sido parcheado en la versión 1.114.3."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N","baseScore":7.7,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.1,"impactScore":4.0}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-200"},{"lang":"en","value":"CWE-668"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:*","versionStartIncluding":"1.65.0","versionEndExcluding":"1.114.3","matchCriteriaId":"AFE146F2-5735-43C4-A7D2-8D3ACA1E522F"}]}]}],"references":[{"url":"https://github.com/n8n-io/n8n/commit/2c4c2953199733c791f739a40879ae31ca129aba","source":"security-advisories@github.com","tags":["Patch"]},{"url":"https://github.com/n8n-io/n8n/security/advisories/GHSA-49mx-fj45-q3p6","source":"security-advisories@github.com","tags":["Mitigation","Vendor Advisory"]}]}}]}