Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: n8n

Found 13 matching suggestions

Published
updated 2 weeks ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse removed
    2 maintainers
    • @gepbird
    • @sweenu
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Domain allowlist bypass enables credential exfiltration

n8n is an open source workflow automation platform. Prior to 1.121.0, there is a vulnerability in the HTTP Request node's credential domain validation allowed an authenticated attacker to send requests with credentials to unintended domains, potentially leading to credential exfiltration. This only might affect user who have credentials that use wildcard domain patterns (e.g., *.example.com) in the "Allowed domains" setting. This issue is fixed in version 1.121.0 and later.

Affected products

n8n
  • ==< 1.121.0

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
Published
updated 2 weeks, 1 day ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @Scrumplex accepted
  • @LeSuisse published on GitHub
Authenticated users can bypass the Expression sandbox mechanism to achieve full remote code execution on n8n’s main node.

n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations.

Affected products

n8n
  • <1.123.17
  • <2.4.5
  • <2.5.1

Matching in nixpkgs

pkgs.n8n

Free and source-available fair-code licensed workflow automation tool

Package maintainers

Fixed in unstable with https://github.com/NixOS/nixpkgs/pull/484604

Advisory: https://github.com/advisories/GHSA-5xrp-6693-jjx9
Published
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n Arbitrary File Write on Remote Systems via SSH Node

n8n is an open source workflow automation platform. Prior to versions 1.123.12 and 2.4.0, when workflows process uploaded files and transfer them to remote servers via the SSH node without validating their metadata the vulnerability can lead to files being written to unintended locations on those remote systems potentially leading to remote code execution on those systems. As a prerequisites an unauthenticated attacker needs knowledge of such workflows existing and the endpoints for file uploads need to be unauthenticated. This issue has been patched in versions 1.123.12 and 2.4.0.

Affected products

n8n
  • ==< 1.123.12
  • ==< 2.4.0

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/n8n-io/n8n/security/advisories/GHSA-m82q-59gv-mcr9
Published
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n is vulnerable to Python sandbox escape

n8n is an open source workflow automation platform. Prior to version 2.4.8, a vulnerability in the Python Code node allows authenticated users to break out of the Python sandbox environment and execute code outside the intended security boundary. This issue has been patched in version 2.4.8.

Affected products

n8n
  • ==< 2.4.8

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/n8n-io/n8n/security/advisories/GHSA-8398-gmmx-564h
Published
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n is Vulnerable to OS Command Injection in Git Node

n8n is an open source workflow automation platform. Prior to versions 1.123.10 and 2.5.0, vulnerabilities in the Git node allowed authenticated users with permission to create or modify workflows to execute arbitrary system commands or read arbitrary files on the n8n host. This issue has been patched in versions 1.123.10 and 2.5.0.

Affected products

n8n
  • ==< 2.5.0
  • ==< 1.123.10

Matching in nixpkgs

Package maintainers

Upstream advisory: https://github.com/n8n-io/n8n/security/advisories/GHSA-9g95-qf3f-ggrw
Published
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n Unsafe Buffer Allocation Allows In-Process Memory Disclosure in Task Runner

n8n is an open source workflow automation platform. From version 1.65.0 to before 1.114.3, the use of Buffer.allocUnsafe() and Buffer.allocUnsafeSlow() in the task runner allowed untrusted code to allocate uninitialized memory. Such uninitialized buffers could contain residual data from within the same Node.js process (for example, data from prior requests, tasks, secrets, or tokens), resulting in potential information disclosure. This issue has been patched in version 1.114.3.

Affected products

n8n
  • ==>= 1.65.0, < 1.114.3

Matching in nixpkgs

Package maintainers

Current stable branch was never impacted.
Published
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse removed
    2 maintainers
    • @gepbird
    • @sweenu
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n Arbitrary File Write leading to RCE in n8n Merge Node

n8n is an open source workflow automation platform. Prior to versions 1.118.0 and 2.4.0, a vulnerability in the Merge node's SQL Query mode allowed authenticated users with permission to create or modify workflows to write arbitrary files to the n8n server's filesystem potentially leading to remote code execution. This issue has been patched in versions 1.118.0 and 2.4.0.

Affected products

n8n
  • ==< 2.4.0
  • ==< 1.118.0

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
Fixed in https://github.com/NixOS/nixpkgs/pull/482177 (unstable), stable was never impacted
Published
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed
    2 maintainers
    • @gepbird
    • @sweenu
  • @LeSuisse accepted
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse published on GitHub
n8n is Vulnerable to Stored Cross-Site Scripting via Markdown Rendering in Workflow UI

n8n is an open source workflow automation platform. Prior to versions 1.123.9 and 2.2.1, a Cross-Site Scripting (XSS) vulnerability existed in a markdown rendering component used in n8n's interface, including workflow sticky notes and other areas that support markdown content. An authenticated user with permission to create or modify workflows could abuse this to execute scripts with same-origin privileges when other users interact with a maliciously crafted workflow. This could lead to session hijacking and account takeover. This issue has been patched in versions 1.123.9 and 2.2.1.

Affected products

n8n
  • ==< 1.123.9
  • ==< 2.2.1

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
Fixed in https://github.com/NixOS/nixpkgs/pull/477990 (25.11) and https://github.com/NixOS/nixpkgs/pull/477422 (unstable)
Published
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse removed
    2 maintainers
    • @sweenu
    • @gepbird
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n Improper CSP Enforcement in Webhook Responses May Allow Stored XSS

n8n is an open source workflow automation platform. Prior to version 1.123.2, a Cross-Site Scripting (XSS) vulnerability has been identified in the handling of webhook responses and related HTTP endpoints. Under certain conditions, the Content Security Policy (CSP) sandbox protection intended to isolate HTML responses may not be applied correctly. An authenticated user with permission to create or modify workflows could abuse this to execute malicious scripts with same-origin privileges when other users interact with the crafted workflow. This could lead to session hijacking and account takeover. This issue has been patched in version 1.123.2.

Affected products

n8n
  • ==< 1.123.2

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
Fixed in https://github.com/NixOS/nixpkgs/pull/477990 (25.11) and https://github.com/NixOS/nixpkgs/pull/477422 (unstable)
Published
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse removed
    2 maintainers
    • @sweenu
    • @gepbird
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n Vulnerable to Command Injection in Community Package Installation

n8n is an open source workflow automation platform. From version 0.187.0 to before 1.120.3, a command injection vulnerability was identified in n8n’s community package installation functionality. The issue allowed authenticated users with administrative permissions to execute arbitrary system commands on the n8n host under specific conditions. This issue has been patched in version 1.120.3.

Affected products

n8n
  • ==>= 0.187.0, < 1.120.3

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
Fixed in https://github.com/NixOS/nixpkgs/pull/477990 (25.11) and https://github.com/NixOS/nixpkgs/pull/477422 (unstable)