<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Source-Control — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/source-control/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 14 May 2026 16:25:57 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/source-control/feed.xml" rel="self" type="application/rss+xml"/><item><title>n8n Source Control Pull SQL Injection Vulnerability (CVE-2026-44792)</title><link>https://feed.craftedsignal.io/briefs/2026-05-n8n-sqli/</link><pubDate>Thu, 14 May 2026 16:25:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-n8n-sqli/</guid><description>A SQL injection vulnerability (CVE-2026-44792) exists in n8n when using PostgreSQL and the Source Control feature, allowing an attacker with write access to the connected Git repository to inject malicious SQL via a crafted column name in a Data Table JSON file during a Source Control Pull.</description><content:encoded><![CDATA[<p>A SQL injection vulnerability (CVE-2026-44792) has been identified in n8n, a workflow automation platform. The vulnerability resides within the Source Control feature when used with a PostgreSQL database backend. An attacker with write access to the Git repository configured for Source Control can inject malicious SQL code by crafting a Data Table JSON file containing a specially crafted column name. When an administrator performs a Source Control Pull operation, the n8n instance imports the attacker-modified file, which then triggers the SQL injection vulnerability in the internal PostgreSQL instance. The vulnerability impacts n8n versions prior to 1.123.43, versions between 2.0.0-rc.0 and 2.20.7, and versions between 2.21.0 and 2.21.1. Successful exploitation allows the attacker to execute arbitrary SQL queries on the n8n PostgreSQL database.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker gains write access to the Git repository configured for n8n&rsquo;s Source Control feature.</li>
<li>Attacker creates a malicious Data Table JSON file. This file contains a crafted column name designed to inject SQL code when processed by n8n.</li>
<li>The malicious JSON file is committed to the Git repository.</li>
<li>An n8n administrator initiates a Source Control Pull operation within the n8n interface.</li>
<li>n8n retrieves the latest changes from the Git repository, including the attacker&rsquo;s malicious Data Table JSON file.</li>
<li>n8n attempts to import the Data Table JSON file. Due to insufficient input validation, the crafted column name is not properly sanitized.</li>
<li>The unsanitized column name is used in a dynamically constructed SQL query against the PostgreSQL database.</li>
<li>The SQL injection vulnerability is triggered, allowing the attacker to execute arbitrary SQL commands on the n8n PostgreSQL instance.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-44792) allows an attacker with write access to the Git repository to execute arbitrary SQL commands on the n8n PostgreSQL database. This could lead to sensitive data exfiltration, modification, or deletion. The attacker could also potentially gain control of the n8n instance or the underlying server, depending on the privileges of the database user. The impact is limited to n8n instances using PostgreSQL as the database backend.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade n8n to version 1.123.43, 2.20.7, 2.21.1 or later to patch CVE-2026-44792 as described in the advisory.</li>
<li>Restrict write access to the Git repository connected to the n8n Source Control feature to only fully trusted users, as mentioned in the workarounds.</li>
<li>If upgrading is not immediately possible, disable the Source Control feature if it is not actively required to prevent exploitation of CVE-2026-44792.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>cve-2026-44792</category><category>source-control</category></item></channel></rss>