{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata. Fed continuously.","feed_url":"https://feed.craftedsignal.io/tags/git-node/feed.json","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cpes":[],"_cs_cves":[],"_cs_exploited":false,"_cs_has_poc":false,"_cs_poc_references":[],"_cs_products":["n8n (\u003c 1.123.43)","n8n (\u003e= 2.21.0, \u003c 2.22.1)","n8n (\u003e= 2.0.0-rc.0, \u003c 2.20.7)"],"_cs_severities":["critical"],"_cs_tags":["arbitrary file read","n8n","git node","CVE-2026-44790"],"_cs_type":"advisory","_cs_vendors":["n8n GmbH"],"content_html":"\u003cp\u003eA critical vulnerability, CVE-2026-44790, exists within the n8n workflow automation platform. The vulnerability resides in the Git node\u0026rsquo;s Push operation, where an authenticated user with permissions to create or modify workflows can inject arbitrary CLI flags. This injection allows the attacker to read arbitrary files from the n8n server\u0026rsquo;s file system. Successful exploitation can lead to complete compromise of the n8n instance, including access to sensitive data stored on the server, such as credentials, API keys, and internal configuration files. Patches have been released in n8n versions 1.123.43, 2.20.7, and 2.22.1 to address this vulnerability.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eAn attacker gains authenticated access to an n8n instance.\u003c/li\u003e\n\u003cli\u003eThe attacker obtains permissions to create or modify workflows within n8n.\u003c/li\u003e\n\u003cli\u003eThe attacker creates or modifies a workflow to include the Git node.\u003c/li\u003e\n\u003cli\u003eWithin the Git node\u0026rsquo;s configuration, specifically the Push operation, the attacker injects malicious CLI flags. These flags are crafted to read arbitrary files from the server\u0026rsquo;s file system (e.g., using \u003ccode\u003egit --help\u003c/code\u003e).\u003c/li\u003e\n\u003cli\u003eThe workflow is executed, and the Git node attempts to perform the Push operation with the injected flags.\u003c/li\u003e\n\u003cli\u003eDue to the flag injection, the Git command executes with the attacker-supplied arguments.\u003c/li\u003e\n\u003cli\u003eThe attacker retrieves the contents of the targeted file, which may contain sensitive information.\u003c/li\u003e\n\u003cli\u003eThe attacker leverages the stolen information to further compromise the n8n instance or connected systems.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of CVE-2026-44790 allows an attacker to read arbitrary files from the n8n server. This can expose sensitive information such as API keys, credentials, configuration files, and other internal data. A successful attack could lead to full compromise of the n8n instance and potentially impact connected systems and data. The severity of the impact is critical due to the potential for complete system takeover and sensitive data exposure.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eUpgrade n8n to version 1.123.43, 2.20.7, 2.22.1, or later to patch CVE-2026-44790 as mentioned in the advisory.\u003c/li\u003e\n\u003cli\u003eLimit workflow creation and editing permissions to only fully trusted users as a short-term workaround.\u003c/li\u003e\n\u003cli\u003eDeploy the Sigma rule \u003ccode\u003eDetect n8n Git Node CLI Injection\u003c/code\u003e to identify potential exploitation attempts by monitoring process execution with suspicious Git commands.\u003c/li\u003e\n\u003cli\u003eMonitor n8n application logs for Git node operations involving unusual command-line arguments, focusing on commands that attempt to read files outside the intended Git repository.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-05-14T16:23:03Z","date_published":"2026-05-14T16:23:03Z","id":"https://feed.craftedsignal.io/briefs/2026-05-n8n-file-read/","summary":"An authenticated user with workflow creation or modification permissions can inject CLI flags into the Git node's Push operation, leading to arbitrary file read on the n8n server; patched in versions 1.123.43, 2.20.7, and 2.22.1, and tracked as CVE-2026-44790.","title":"n8n Arbitrary File Read via Git Node (CVE-2026-44790)","url":"https://feed.craftedsignal.io/briefs/2026-05-n8n-file-read/"}],"language":"en","title":"CraftedSignal Threat Feed — Git Node","version":"https://jsonfeed.org/version/1.1"}