<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>N8n (&lt; 1.123.32) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/n8n--1.123.32/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 14:14:35 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/n8n--1.123.32/feed.xml" rel="self" type="application/rss+xml"/><item><title>Critical Prototype Pollution Vulnerabilities in n8n Lead to Remote Code Execution</title><link>https://feed.craftedsignal.io/briefs/2026-05-n8n-rce/</link><pubDate>Tue, 05 May 2026 14:14:35 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-n8n-rce/</guid><description>Critical Prototype Pollution vulnerabilities (CVE-2026-42231 and CVE-2026-42232) in n8n versions prior to 1.123.32, 2.17.4, and 2.18.1 can be exploited by authenticated users with workflow editing rights to achieve Remote Code Execution (RCE) on the n8n host.</description><content:encoded><![CDATA[<p>Multiple critical vulnerabilities have been discovered in n8n, a widely used workflow automation tool. These vulnerabilities, identified as CVE-2026-42231 and CVE-2026-42232, involve Prototype Pollution flaws that can be escalated to Remote Code Execution (RCE) on the n8n host. The vulnerabilities affect n8n versions prior to 1.123.32, 2.17.4, and 2.18.1. An authenticated user with workflow editing rights can exploit these vulnerabilities by injecting malicious properties into the global object prototype, ultimately executing unauthorized commands directly on the underlying host server. These flaws can be exploited via the webhook infrastructure or the XML Node component.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user gains access to the n8n instance with workflow editing rights.</li>
<li>The attacker crafts a malicious XML payload or workflow utilizing the XML Node component.</li>
<li>The malicious payload is designed to inject properties into the global object prototype, exploiting the Prototype Pollution vulnerability (CVE-2026-42231 or CVE-2026-42232).</li>
<li>The polluted data is routed through the Git node&rsquo;s SSH functions (in the case of CVE-2026-42231) or other susceptible workflow nodes.</li>
<li>The injected properties modify the behavior of subsequent operations performed by the n8n instance.</li>
<li>The Git node (or other exploited node) executes commands based on the polluted prototype, leading to arbitrary code execution on the n8n server.</li>
<li>The attacker gains control of the n8n server.</li>
<li>The attacker leverages the compromised server for further malicious activities, such as data exfiltration or lateral movement.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities allows an attacker to achieve Remote Code Execution (RCE) on the n8n host. This can lead to complete compromise of the n8n instance, including unauthorized access to sensitive data, modification of workflows, and potentially the compromise of other systems connected to the n8n instance. The high CVSS scores (9.4) for both CVEs reflect the significant impact on Confidentiality, Integrity, and Availability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Immediately patch n8n instances to versions 1.123.32, 2.17.4, 2.18.1 or later to remediate CVE-2026-42231 and CVE-2026-42232, as recommended by the vendor.</li>
<li>Implement monitoring and detection capabilities to identify suspicious activity related to prototype pollution attempts, as advised in the advisory.</li>
<li>Review and restrict workflow editing rights to minimize the attack surface and reduce the potential for unauthorized modifications.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>prototype-pollution</category><category>rce</category><category>n8n</category></item></channel></rss>