Product
n8n XML Node Prototype Pollution Leading to RCE
3 rules 1 TTPA vulnerability in n8n allows authenticated users with workflow creation permissions to achieve remote code execution (RCE) through global prototype pollution via the XML Node in versions prior to 1.123.32, versions 2.17.0 to 2.17.4, and versions 2.18.0 to 2.18.1.
n8n MCP OAuth Client XSS Vulnerability
2 rules 1 TTPn8n is vulnerable to cross-site scripting (XSS) via a malicious MCP OAuth client, allowing an unauthenticated attacker to inject arbitrary JavaScript into an authenticated user's session.
n8n Prototype Pollution in XML Webhook Body Parser Leads to RCE
2 rules 1 TTPA prototype pollution vulnerability in n8n's XML webhook parser, exploitable by authenticated users, can lead to remote code execution on the n8n host.
n8n Python Task Runner Sandbox Escape Vulnerability
2 rules 2 TTPsA sandbox escape vulnerability exists in n8n's Python Task Runner that allows an authenticated user with workflow creation/modification permissions to achieve arbitrary code execution on the task runner container, impacting n8n instances with the Python Task Runner enabled; upgrade to versions 1.123.32, 2.17.4, 2.18.1 or later to remediate the vulnerability.
Multiple Vulnerabilities in n8n Workflow Automation Tool
3 rules 5 TTPs 1 CVEMultiple vulnerabilities in n8n can be exploited by an attacker to execute arbitrary code, bypass security measures, disclose sensitive information, conduct SQL injection attacks, cause denial-of-service, perform cross-site scripting, redirect users, or hijack sessions.
n8n Credential Authorization Bypass in dynamic-node-parameters Allows Foreign API Key Replay
2 rules 1 TTPA credential authorization bypass vulnerability in n8n versions before 2.18.0 allows an authenticated user with access to a shared workflow to supply a foreign credential ID, causing the backend to decrypt and use that credential against attacker-controlled infrastructure, leading to API key exfiltration.
n8n Unauthenticated Denial of Service via MCP Client Registration
2 rules 1 TTPn8n is vulnerable to an unauthenticated denial of service (DoS) attack due to missing resource controls in the MCP OAuth client registration endpoint, allowing an attacker to exhaust server memory by sending large registration payloads, leading to service unavailability; this is resolved in versions 1.123.32, 2.17.4, and 2.18.1 and tracked as CVE-2026-42236.