<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-44789 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-44789/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 16:23:16 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-44789/feed.xml" rel="self" type="application/rss+xml"/><item><title>n8n HTTP Request Node Prototype Pollution Vulnerability Leads to RCE (CVE-2026-44789)</title><link>https://feed.craftedsignal.io/briefs/2026-05-n8n-rce/</link><pubDate>Thu, 14 May 2026 16:23:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-n8n-rce/</guid><description>An authenticated user with workflow creation/modification permissions in n8n can achieve remote code execution (RCE) via global prototype pollution in the HTTP Request node due to an unvalidated pagination parameter, as tracked by CVE-2026-44789.</description><content:encoded><![CDATA[<p>A critical vulnerability exists in the n8n HTTP Request node that could allow an authenticated user to achieve remote code execution (RCE). The vulnerability stems from insufficient validation of pagination parameters within the HTTP Request node, leading to global prototype pollution. An attacker with permission to create or modify workflows can exploit this by injecting malicious payloads via the pagination settings. This vulnerability affects n8n versions prior to 1.123.43, versions 2.21.0 to 2.22.1, and versions 2.0.0-rc.0 to 2.20.7. Successful exploitation grants the attacker the ability to execute arbitrary code on the n8n instance.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An authenticated user logs into the n8n instance.</li>
<li>The user creates or modifies an existing workflow.</li>
<li>Within the workflow, the user adds an HTTP Request node.</li>
<li>The user configures the HTTP Request node to use pagination.</li>
<li>The user injects a malicious payload into the pagination parameter, exploiting the prototype pollution vulnerability.</li>
<li>The injected payload pollutes the global prototype.</li>
<li>The attacker leverages the prototype pollution to achieve code execution, potentially by overwriting critical functions or properties.</li>
<li>The attacker executes arbitrary commands on the n8n instance, potentially leading to complete system compromise.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability, tracked as CVE-2026-44789, allows an attacker to execute arbitrary code on the n8n instance. This could lead to complete system compromise, data theft, or denial of service. The severity is rated as critical due to the potential for RCE and the relatively low skill required to exploit the vulnerability. Organizations using vulnerable versions of n8n are at significant risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade n8n to version 1.123.43, 2.20.7, 2.22.1, or later to patch CVE-2026-44789 (see Patches section).</li>
<li>Limit workflow creation and editing permissions to only fully trusted users as a short-term mitigation (see Workarounds section).</li>
<li>Disable the HTTP Request node by adding <code>n8n-nodes-base.httpRequest</code> to the <code>NODES_EXCLUDE</code> environment variable as another temporary mitigation (see Workarounds section).</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>prototype-pollution</category><category>rce</category><category>cve-2026-44789</category><category>n8n</category></item></channel></rss>