<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>N8n — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/n8n/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Thu, 30 Apr 2026 18:12:54 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/n8n/feed.xml" rel="self" type="application/rss+xml"/><item><title>n8n-mcp SDK Embedder SSRF Vulnerability via IPv6 Bypass</title><link>https://feed.craftedsignal.io/briefs/2026-04-n8n-mcp-ssrf/</link><pubDate>Thu, 30 Apr 2026 18:12:54 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-n8n-mcp-ssrf/</guid><description>The n8n-mcp SDK embedder path is vulnerable to server-side request forgery (SSRF) due to the synchronous URL validator in `SSRFProtection.validateUrlSync()` not checking for IPv6 addresses, allowing attackers to access cloud metadata endpoints, RFC1918 private networks, or localhost services by supplying a crafted `n8nApiUrl`.</description><content:encoded><![CDATA[<p>The n8n-mcp library, when embedded as an SDK, contains a server-side request forgery (SSRF) vulnerability. The vulnerability lies in the <code>SSRFProtection.validateUrlSync()</code> function, specifically within the <code>N8NDocumentationMCPServer</code> constructor, <code>getN8nApiClient()</code>, and <code>validateInstanceContext()</code> methods. This synchronous validator lacks IPv6 checks, allowing IPv4-mapped IPv6 addresses (e.g., <code>http://[::ffff:169.254.169.254]</code>) to bypass existing protections against cloud metadata, localhost, and private IP ranges. An attacker who can control the <code>n8nApiUrl</code> parameter can exploit this flaw to force the server to make HTTP requests to internal or external services. This issue affects deployments embedding n8n-mcp as an SDK using <code>N8NDocumentationMCPServer</code> or <code>N8NMCPEngine</code> with user-supplied <code>InstanceContext</code> on versions v2.47.4 through v2.47.13. Version v2.47.14 and later contain the patch for this vulnerability.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a vulnerable n8n-mcp deployment embedding the SDK and using a user-supplied <code>InstanceContext</code>.</li>
<li>The attacker crafts a malicious <code>n8nApiUrl</code> containing an IPv4-mapped IPv6 address, such as <code>http://[::ffff:169.254.169.254]</code>.</li>
<li>The attacker supplies the crafted <code>n8nApiUrl</code> to the vulnerable <code>N8NDocumentationMCPServer</code> constructor or <code>getN8nApiClient()</code> method.</li>
<li>The <code>validateInstanceContext()</code> function calls <code>SSRFProtection.validateUrlSync()</code> to validate the URL.</li>
<li>The <code>validateUrlSync()</code> function fails to properly validate the IPv4-mapped IPv6 address.</li>
<li>The server issues an HTTP request to the attacker-specified target using the bypassed URL.</li>
<li>The <code>x-n8n-api-key</code> header is forwarded to the attacker-controlled target.</li>
<li>The response body from the target is returned to the attacker, allowing the attacker to gather sensitive information from internal services or cloud metadata endpoints.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SSRF vulnerability allows an attacker to perform unauthorized actions, such as accessing sensitive information from cloud metadata endpoints (AWS IMDS, GCP, Azure, Alibaba, Oracle), RFC1918 private networks, or localhost services. The attacker can also gain access to the <code>n8nApiKey</code>, which is forwarded in the <code>x-n8n-api-key</code> header, potentially leading to further compromise of the n8n instance. This vulnerability impacts deployments embedding n8n-mcp as an SDK between versions v2.47.4 and v2.47.13.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade n8n-mcp to version v2.47.14 or later to patch the vulnerability as described in the advisory.</li>
<li>Implement a network-level block on outbound traffic from the n8n-mcp process to RFC1918 ranges (10.0.0.0/8, 172.16.0.0/12, 192.168.0.0/16), link-local <code>169.254.0.0/16</code>, and cloud metadata endpoints as a defense-in-depth measure.</li>
<li>Deploy the Sigma rule <code>Detect N8N MCP SSRF Attempt via IPv6 Bypass</code> to identify exploitation attempts by detecting outbound connections to internal IPs using IPv6 mapped IPv4 address.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>ssrf</category><category>cwe-918</category><category>n8n-mcp</category></item><item><title>n8n Python Task Runner Sandbox Escape Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-04-n8n-python-sandbox-escape/</link><pubDate>Wed, 29 Apr 2026 21:21:50 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-n8n-python-sandbox-escape/</guid><description>A sandbox escape vulnerability exists in n8n's Python Task Runner that allows an authenticated user with workflow creation/modification permissions to achieve arbitrary code execution on the task runner container, impacting n8n instances with the Python Task Runner enabled; upgrade to versions 1.123.32, 2.17.4, 2.18.1 or later to remediate the vulnerability.</description><content:encoded><![CDATA[<p>A sandbox escape vulnerability has been identified in the Python Task Runner of n8n, a workflow automation platform. This vulnerability, assigned CVE-2026-42234, allows an authenticated user who has permissions to create or modify workflows that contain a Python Code Node to escape the sandbox environment. Successful exploitation leads to arbitrary code execution within the task runner container. This issue specifically impacts n8n instances where the Python Task Runner is enabled. The vulnerability affects n8n versions prior to 1.123.32, versions between 2.17.0 and 2.17.4, and versions between 2.18.0 and 2.18.1. Defenders should prioritize patching their n8n instances or implementing available workarounds.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to an n8n instance.</li>
<li>The attacker verifies the Python Task Runner is enabled.</li>
<li>The attacker creates or modifies an n8n workflow.</li>
<li>The workflow includes a Python Code Node.</li>
<li>The attacker crafts malicious Python code designed to escape the sandbox. This code could leverage vulnerabilities in the sandbox implementation to execute commands outside of the intended restricted environment.</li>
<li>The attacker triggers the workflow execution.</li>
<li>The malicious Python code executes, successfully escaping the sandbox.</li>
<li>Arbitrary code is executed on the task runner container, potentially leading to compromise of the n8n instance or the underlying infrastructure.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows an attacker to execute arbitrary code within the n8n task runner container. This can lead to a full compromise of the n8n instance, allowing the attacker to steal sensitive data, disrupt services, or pivot to other systems within the network. While the exact number of affected instances is unknown, any n8n deployment with the Python Task Runner enabled and vulnerable versions are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade n8n to versions 1.123.32, 2.17.4, 2.18.1 or later to remediate the vulnerability as recommended by the vendor.</li>
<li>If upgrading is not immediately possible, limit workflow creation and editing permissions to fully trusted users only, as mentioned in the advisory.</li>
<li>As a temporary measure, disable the Python Code node by adding <code>n8n-nodes-base.code</code> to the <code>NODES_EXCLUDE</code> environment variable, or disable the Python Task Runner entirely as documented in the advisory.</li>
<li>Monitor container execution for unexpected processes spawned from the n8n task runner container using the &ldquo;Detect Suspicious Process Execution from n8n Task Runner&rdquo; Sigma rule.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sandbox-escape</category><category>code-execution</category><category>vulnerability</category></item><item><title>Multiple Vulnerabilities in n8n Workflow Automation Tool</title><link>https://feed.craftedsignal.io/briefs/2026-04-n8n-multiple-vulnerabilities/</link><pubDate>Thu, 23 Apr 2026 10:23:56 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-04-n8n-multiple-vulnerabilities/</guid><description>Multiple vulnerabilities in n8n can be exploited by an attacker to execute arbitrary code, bypass security measures, disclose sensitive information, conduct SQL injection attacks, cause denial-of-service, perform cross-site scripting, redirect users, or hijack sessions.</description><content:encoded><![CDATA[<p>Multiple vulnerabilities have been identified in n8n, a workflow automation tool. An attacker exploiting these vulnerabilities could achieve a range of malicious outcomes, including remote code execution, security bypass, information disclosure, SQL injection, denial-of-service, cross-site scripting (XSS), malicious redirection, and session hijacking. The vulnerabilities stem from insufficient input validation, insecure configurations, or design flaws within the n8n application. Successful exploitation can lead to complete compromise of the n8n instance and potentially the underlying system, depending on the permissions of the n8n process. This poses a significant risk to organizations relying on n8n for critical business processes. Defenders need to implement robust security measures to mitigate these risks.</p>
<h2 id="attack-chain">Attack Chain</h2>
<p>Given the broad range of potential vulnerabilities, a generalized attack chain is outlined below:</p>
<ol>
<li><strong>Reconnaissance:</strong> The attacker identifies a vulnerable n8n instance, potentially through Shodan or similar tools.</li>
<li><strong>Vulnerability Identification:</strong> The attacker probes the n8n instance to identify specific exploitable vulnerabilities, such as those related to SQL injection or XSS.</li>
<li><strong>Exploitation (SQL Injection):</strong> The attacker crafts malicious SQL queries through user input fields or API calls to extract sensitive data from the n8n database, such as user credentials or API keys.</li>
<li><strong>Exploitation (XSS):</strong> The attacker injects malicious JavaScript code into n8n workflows or data fields. When other users interact with the affected workflows or data, the JavaScript code executes in their browsers.</li>
<li><strong>Privilege Escalation/Lateral Movement:</strong> The attacker leverages the compromised credentials or XSS vulnerabilities to gain elevated privileges within the n8n instance or move laterally to other systems within the network.</li>
<li><strong>Remote Code Execution:</strong> The attacker exploits a vulnerability that allows for the execution of arbitrary code on the server. This could be achieved through insecure file uploads, deserialization flaws, or command injection.</li>
<li><strong>Persistence:</strong> The attacker establishes persistence by creating new n8n workflows or modifying existing ones to execute malicious code on a recurring basis.</li>
<li><strong>Impact:</strong> The attacker exfiltrates sensitive data, disrupts critical business processes by manipulating or deleting workflows, or uses the compromised system as a foothold for further attacks within the network.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of these vulnerabilities could result in significant damage, depending on the attacker&rsquo;s objectives. The potential impact includes data breaches, financial losses, service disruptions, and reputational damage. If sensitive data is exfiltrated, it could be used for identity theft, fraud, or other malicious purposes. Disruption of critical workflows can lead to business downtime and lost productivity. The lack of specific victim counts or sector targeting in the source data makes it difficult to quantify the impact precisely, but the broad range of potential vulnerabilities and their potential consequences warrant immediate attention.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Implement the provided Sigma rules to detect potential exploitation attempts targeting n8n instances (see &ldquo;Descriptive Detection Rule Name&rdquo; in the <code>rules</code> section).</li>
<li>Conduct regular security audits and penetration testing of n8n instances to identify and remediate vulnerabilities before they can be exploited.</li>
<li>Enforce strict input validation and sanitization measures to prevent SQL injection and XSS attacks.</li>
<li>Apply the principle of least privilege to limit the permissions of the n8n process and users.</li>
<li>Monitor network traffic for suspicious activity related to n8n instances, such as unusual API calls or connections to malicious domains.</li>
<li>Regularly review and update n8n workflows to ensure they are secure and do not contain any malicious code.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>n8n</category><category>vulnerability</category><category>sqli</category><category>xss</category><category>rce</category><category>session-hijacking</category></item><item><title>n8n Credential Authorization Bypass in dynamic-node-parameters Allows Foreign API Key Replay</title><link>https://feed.craftedsignal.io/briefs/2024-01-03-n8n-credential-bypass/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-03-n8n-credential-bypass/</guid><description>A credential authorization bypass vulnerability in n8n versions before 2.18.0 allows an authenticated user with access to a shared workflow to supply a foreign credential ID, causing the backend to decrypt and use that credential against attacker-controlled infrastructure, leading to API key exfiltration.</description><content:encoded><![CDATA[<p>A credential authorization bypass vulnerability, identified as CVE-2026-42226, affects n8n versions prior to 2.18.0, specifically in the <code>dynamic-node-parameters</code> endpoints. This flaw allows an authenticated user who has access to a shared workflow to exploit the system by supplying a credential ID belonging to another user in the request body. Due to insufficient validation, the n8n backend decrypts and utilizes the specified credential during a helper execution path where the caller controls the destination URL. This enables the malicious user to force the n8n instance to authenticate against attacker-controlled infrastructure using another user&rsquo;s credentials, effectively exfiltrating a reusable API key. The vulnerability impacts any node that dynamically resolves credentials through the affected endpoints. The issue was patched in n8n version 2.18.0.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains authenticated access to an n8n instance.</li>
<li>The attacker obtains access to a shared workflow.</li>
<li>The attacker identifies a credential ID belonging to another user within the n8n instance.</li>
<li>The attacker crafts a request to a vulnerable <code>dynamic-node-parameters</code> endpoint, injecting the foreign credential ID into the request body.</li>
<li>The n8n backend, failing to validate the attacker&rsquo;s authorization to use the specified credential, decrypts the targeted credential.</li>
<li>The attacker controls the destination URL in the request, pointing it to attacker-controlled infrastructure.</li>
<li>The n8n backend authenticates against the attacker-controlled infrastructure using the decrypted credential, sending the API key to the attacker.</li>
<li>The attacker captures the API key and uses it to access resources or data accessible to the compromised credential.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability (CVE-2026-42226) allows an attacker to exfiltrate API keys belonging to other n8n users. This can lead to unauthorized access to external services and data, depending on the permissions granted to the compromised credentials. The impact is significant, potentially affecting all n8n instances running vulnerable versions (prior to 2.18.0). The severity is rated as high due to the ease of exploitation and the potential for significant data breaches.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade n8n to version 2.18.0 or later to patch the vulnerability (CVE-2026-42226).</li>
<li>Deploy the Sigma rule <code>Detect n8n Foreign Credential ID in dynamic-node-parameters</code> to identify attempts to exploit this vulnerability.</li>
<li>Implement stricter access controls and limit workflow sharing to trusted users as a short-term mitigation, as suggested in the overview.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>credential-access</category><category>authorization-bypass</category><category>n8n</category></item></channel></rss>