Skip to content
Threat Feed

Product

N8n

7 briefs RSS
critical advisory

n8n XML Node Prototype Pollution Leading to RCE

A vulnerability in n8n allows authenticated users with workflow creation permissions to achieve remote code execution (RCE) through global prototype pollution via the XML Node in versions prior to 1.123.32, versions 2.17.0 to 2.17.4, and versions 2.18.0 to 2.18.1.

n8n rce prototype pollution
3r 1t
high advisory

n8n MCP OAuth Client XSS Vulnerability

n8n is vulnerable to cross-site scripting (XSS) via a malicious MCP OAuth client, allowing an unauthenticated attacker to inject arbitrary JavaScript into an authenticated user's session.

n8n xss oauth CVE-2026-42235
2r 1t
critical advisory

n8n Prototype Pollution in XML Webhook Body Parser Leads to RCE

A prototype pollution vulnerability in n8n's XML webhook parser, exploitable by authenticated users, can lead to remote code execution on the n8n host.

n8n prototype-pollution rce
2r 1t
high advisory

n8n Python Task Runner Sandbox Escape Vulnerability

A sandbox escape vulnerability exists in n8n's Python Task Runner that allows an authenticated user with workflow creation/modification permissions to achieve arbitrary code execution on the task runner container, impacting n8n instances with the Python Task Runner enabled; upgrade to versions 1.123.32, 2.17.4, 2.18.1 or later to remediate the vulnerability.

n8n sandbox-escape code-execution vulnerability
2r 2t
critical advisory

Multiple Vulnerabilities in n8n Workflow Automation Tool

Multiple vulnerabilities in n8n can be exploited by an attacker to execute arbitrary code, bypass security measures, disclose sensitive information, conduct SQL injection attacks, cause denial-of-service, perform cross-site scripting, redirect users, or hijack sessions.

n8n vulnerability sqli xss rce session-hijacking
3r 5t 1c
high advisory

n8n Credential Authorization Bypass in dynamic-node-parameters Allows Foreign API Key Replay

A credential authorization bypass vulnerability in n8n versions before 2.18.0 allows an authenticated user with access to a shared workflow to supply a foreign credential ID, causing the backend to decrypt and use that credential against attacker-controlled infrastructure, leading to API key exfiltration.

n8n credential-access authorization-bypass
2r 1t
medium advisory

n8n Unauthenticated Denial of Service via MCP Client Registration

n8n is vulnerable to an unauthenticated denial of service (DoS) attack due to missing resource controls in the MCP OAuth client registration endpoint, allowing an attacker to exhaust server memory by sending large registration payloads, leading to service unavailability; this is resolved in versions 1.123.32, 2.17.4, and 2.18.1 and tracked as CVE-2026-42236.

n8n denial-of-service vulnerability
2r 1t