<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Alaqsl — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/alaqsl/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 26 Mar 2026 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/alaqsl/feed.xml" rel="self" type="application/rss+xml"/><item><title>n8n Merge Node AlaSQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-03-n8n-rce/</link><pubDate>Thu, 26 Mar 2026 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-03-n8n-rce/</guid><description>An authenticated user with workflow creation/modification permissions can exploit insufficient restrictions in the n8n Merge node's AlaSQL sandbox to achieve remote code execution by reading local files or executing commands on the n8n host.</description><content:encoded><![CDATA[<p>A critical remote code execution vulnerability has been identified in n8n, a popular workflow automation tool. Specifically, the vulnerability resides within the Merge node&rsquo;s &ldquo;Combine by SQL&rdquo; mode. Versions of n8n prior to 2.14.1, 2.13.3, and 1.123.27 are affected. An authenticated user with the ability to create or modify workflows can leverage the AlaSQL sandbox&rsquo;s insufficient input sanitization to inject malicious SQL code. This allows the attacker to potentially read arbitrary local files from the n8n host or execute arbitrary commands, leading to full system compromise. This vulnerability poses a significant risk to organizations using n8n, as it allows attackers to gain unauthorized access and control over their systems and data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker authenticates to the n8n instance with user account having workflow creation/modification permissions.</li>
<li>The attacker creates or modifies an existing workflow.</li>
<li>The attacker adds a Merge node to the workflow and sets its mode to &ldquo;Combine by SQL&rdquo;.</li>
<li>The attacker crafts a malicious SQL query within the Merge node&rsquo;s SQL configuration, taking advantage of insufficient input validation in the AlaSQL sandbox. The SQL query may attempt to read sensitive files from the file system, for example, <code>/etc/passwd</code> or application configuration files.</li>
<li>The malicious SQL query executes when the workflow is triggered, potentially reading files from the n8n server.</li>
<li>Alternatively, the malicious SQL query could execute commands via the <code>SYSTEM</code> function or other methods available through AlaSQL, leading to remote code execution on the n8n host.</li>
<li>If successful, the attacker gains control of the n8n process.</li>
<li>The attacker uses the compromised n8n instance to pivot to other systems on the network, steal sensitive data, or disrupt services.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code on the n8n server. This can lead to complete system compromise, including the ability to steal sensitive data, install malware, or disrupt services. The number of affected n8n instances is currently unknown, but given the popularity of the platform in various sectors, the potential impact is widespread. Organizations using vulnerable versions of n8n are at high risk of data breaches, financial losses, and reputational damage.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade n8n to version 2.14.1, 2.13.3, 1.123.27 or later to patch CVE-2026-33660.</li>
<li>If upgrading is not immediately feasible, limit workflow creation and editing permissions to only fully trusted users as a short-term mitigation (reference Overview).</li>
<li>As an alternative temporary workaround, disable the Merge node by adding <code>n8n-nodes-base.merge</code> to the <code>NODES_EXCLUDE</code> environment variable (reference Overview).</li>
<li>Monitor n8n application logs for suspicious SQL queries or other anomalous activity originating from the Merge node (create custom detection logic based on observed AlaSQL activity).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>n8n</category><category>rce</category><category>alaqsl</category><category>injection</category></item></channel></rss>