Nixpkgs security tracker

Login with GitHub

Suggestions search

With package: n8n

Found 31 matching suggestions

View:
Compact
Detailed
Published
updated 1 month ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    3 packages
    • n8n-nodes-carbonejs
    • n8n-nodes-evolution-api
    • n8n-task-runner-launcher
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n Vulnerable to LDAP Filter Injection in LDAP Node

n8n is an open source workflow automation platform. Prior to versions 1.123.27, 2.13.3, and 2.14.1, a flaw in the LDAP node's filter escape logic allowed LDAP metacharacters to pass through unescaped when user-controlled input was interpolated into LDAP search filters. In workflows where external user input is passed via expressions into the LDAP node's search parameters, an attacker could manipulate the constructed filter to retrieve unintended LDAP records or bypass authentication checks implemented in the workflow. Exploitation requires a specific workflow configuration. The LDAP node must be used with user-controlled input passed via expressions (e.g., from a form or webhook). The issue has been fixed in n8n versions 1.123.27, 2.13.3, and 2.14.1. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only, disable the LDAP node by adding `n8n-nodes-base.ldap` to the `NODES_EXCLUDE` environment variable, and/or avoid passing unvalidated external user input into LDAP node search parameters via expressions. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.

Affected products

n8n
  • ==< 1.123.27
  • ==>= 2.0.0-rc.0, < 2.13.3
  • === 2.14.0

Matching in nixpkgs

pkgs.n8n

Free and source-available fair-code licensed workflow automation tool

Ignored packages (3)

Package maintainers

Upstream advisory: https://github.com/n8n-io/n8n/security/advisories/GHSA-w83q-mcmx-mh42
Published
updated 2 months ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    3 packages
    • n8n-nodes-carbonejs
    • n8n-task-runner-launcher
    • tests.fetchpatch2.relative
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n has a Sandbox Escape in its JavaScript Task Runner

n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could exploit a vulnerability in the JavaScript Task Runner sandbox to execute arbitrary code outside the sandbox boundary. On instances using internal Task Runners (default runner mode), this could result in full compromise of the n8n host. On instances using external Task Runners, the attacker might gain access to or impact other task executed on the Task Runner. Task Runners must be enabled using `N8N_RUNNERS_ENABLED=true`. The issue has been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Limit workflow creation and editing permissions to fully trusted users only, and/or use external runner mode (`N8N_RUNNERS_MODE=external`) to limit the blast radius. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.

Affected products

n8n
  • ==< 1.123.22
  • ==>= 2.0.0, < 2.9.3
  • ==>= 2.10.0, < 2.10.1

Matching in nixpkgs

pkgs.n8n

Free and source-available fair-code licensed workflow automation tool

Ignored packages (3)

Package maintainers

Upstream advisory: https://github.com/n8n-io/n8n/security/advisories/GHSA-jjpj-p2wh-qf23
Published
updated 2 months ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    3 packages
    • n8n-nodes-carbonejs
    • n8n-task-runner-launcher
    • tests.fetchpatch2.relative
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n: Expression Sandbox Escape Leads to RCE

n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, additional exploits in the expression evaluation of n8n have been identified and patched following CVE-2025-68613. An authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. The issues have been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to one of these versions or later to remediate all known vulnerabilities. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Limit workflow creation and editing permissions to fully trusted users only, and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.

Affected products

n8n
  • ==< 1.123.22
  • ==>= 2.0.0, < 2.9.3
  • ==>= 2.10.0, < 2.10.1

Matching in nixpkgs

pkgs.n8n

Free and source-available fair-code licensed workflow automation tool

Ignored packages (3)

Package maintainers

Upstream advisory: https://github.com/n8n-io/n8n/security/advisories/GHSA-vpcf-gvg4-6qwr
Published
updated 2 months ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    3 packages
    • n8n-nodes-carbonejs
    • n8n-task-runner-launcher
    • tests.fetchpatch2.relative
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n has Potential Remote Code Execution via Merge Node

n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could leverage the Merge node's SQL query mode to execute arbitrary code and write arbitrary files on the n8n server. The issues have been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to one of these versions or later to remediate all known vulnerabilities. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Limit workflow creation and editing permissions to fully trusted users only, and/or disable the Merge node by adding `n8n-nodes-base.merge` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.

Affected products

n8n
  • ==< 1.123.22
  • ==>= 2.0.0, < 2.9.3
  • ==>= 2.10.0, < 2.10.1

Matching in nixpkgs

pkgs.n8n

Free and source-available fair-code licensed workflow automation tool

Ignored packages (3)

Package maintainers

Upstream advisory: https://github.com/n8n-io/n8n/security/advisories/GHSA-vpcf-gvg4-6qwr
Published
updated 2 months ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    3 packages
    • n8n-nodes-carbonejs
    • n8n-task-runner-launcher
    • tests.fetchpatch2.relative
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n has Arbitrary File Read via Python Code Node Sandbox Escape

n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could use the Python Code node to escape the sandbox. The sandbox did not sufficiently restrict access to certain built-in Python objects, allowing an attacker to exfiltrate file contents or achieve RCE. On instances using internal Task Runners (default runner mode), this could result in full compromise of the n8n host. On instances using external Task Runners, the attacker might gain access to or impact other task executed on the Task Runner. Task Runners must be enabled using `N8N_RUNNERS_ENABLED=true`. The issue has been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to this version or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Limit workflow creation and editing permissions to fully trusted users only., and/or disable the Code node by adding `n8n-nodes-base.code` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.

Affected products

n8n
  • ==< 1.123.22
  • ==>= 2.0.0, < 2.9.3
  • ==>= 2.10.0, < 2.10.1

Matching in nixpkgs

pkgs.n8n

Free and source-available fair-code licensed workflow automation tool

Ignored packages (3)

Package maintainers

Upstream advisory: https://github.com/n8n-io/n8n/security/advisories/GHSA-mmgg-m5j7-f83h
Published
updated 2 months ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    3 packages
    • n8n-nodes-carbonejs
    • n8n-task-runner-launcher
    • tests.fetchpatch2.relative
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n Vulnerable to Stored XSS via Various Nodes

n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could inject arbitrary scripts into pages rendered by the n8n application using different techniques on various nodes (Form Trigger node, Chat Trigger node, Send & Wait node, Webhook Node, and Chat Node). Scripts injected by a malicious workflow execute in the browser of any user who visits the affected page, enabling session hijacking and account takeover. The issues have been fixed in n8n versions 2.10.1 and 1.123.21. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Limit workflow creation and editing permissions to fully trusted users only, and/or disable the Webhook node by adding `n8n-nodes-base.webhook` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.

Affected products

n8n
  • ==< 1.123.22
  • ==>= 2.0.0, < 2.9.3
  • ==>= 2.10.0, < 2.10.1

Matching in nixpkgs

pkgs.n8n

Free and source-available fair-code licensed workflow automation tool

Ignored packages (3)

Package maintainers

Upstream advisory: https://github.com/n8n-io/n8n/security/advisories/GHSA-2p9h-rqjw-gm92
Published
updated 2 months ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    3 packages
    • tests.fetchpatch2.relative
    • n8n-task-runner-launcher
    • n8n-nodes-carbonejs
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n has Arbitrary Command Execution via File Write and Git Operations

n8n is an open source workflow automation platform. Prior to versions 2.2.0 and 1.123.8, an authenticated user with permission to create or modify workflows could chain the Read/Write Files from Disk node with git operations to achieve remote code execution. By writing to specific configuration files and then triggering a git operation, the attacker could execute arbitrary shell commands on the n8n host. The issue has been fixed in n8n versions 2.2.0 and 1.123.8. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Limit workflow creation and editing permissions to fully trusted users only, and/or disable the Read/Write Files from Disk node by adding `n8n-nodes-base.readWriteFile` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.

Affected products

n8n
  • ==>= 2.0.0, < 2.2.0
  • ==< 1.123.8

Matching in nixpkgs

pkgs.n8n

Free and source-available fair-code licensed workflow automation tool

Ignored packages (3)

Package maintainers

Upstream advisory: https://github.com/n8n-io/n8n/security/advisories/GHSA-x2mw-7j39-93xq
Published
updated 2 months ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored
    3 packages
    • tests.fetchpatch2.relative
    • n8n-task-runner-launcher
    • n8n-nodes-carbonejs
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n has Unauthenticated Expression Evaluation via Form Node

n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, a second-order expression injection vulnerability existed in n8n's Form nodes that could allow an unauthenticated attacker to inject and evaluate arbitrary n8n expressions by submitting crafted form data. When chained with an expression sandbox escape, this could escalate to remote code execution on the n8n host. The vulnerability requires a specific workflow configuration to be exploitable. First, a form node with a field interpolating a value provided by an unauthenticated user, e.g. a form submitted value. Second, the field value must begin with an `=` character, which caused n8n to treat it as an expression and triggered a double-evaluation of the field content. There is no practical reason for a workflow designer to prefix a field with `=` intentionally — the character is not rendered in the output, so the result would not match the designer's expectations. If added accidentally, it would be noticeable and very unlikely to persist. An unauthenticated attacker would need to either know about this specific circumstance on a target instance or discover a matching form by chance. Even when the preconditions are met, the expression injection alone is limited to data accessible within the n8n expression context. Escalation to remote code execution requires chaining with a separate sandbox escape vulnerability. The issue has been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Review usage of form nodes manually for above mentioned preconditions, disable the Form node by adding `n8n-nodes-base.form` to the `NODES_EXCLUDE` environment variable, and/or disable the Form Trigger node by adding `n8n-nodes-base.formTrigger` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.

Affected products

n8n
  • ==< 1.123.22
  • ==>= 2.0.0, < 2.9.3
  • ==>= 2.10.0, < 2.10.1

Matching in nixpkgs

pkgs.n8n

Free and source-available fair-code licensed workflow automation tool

Ignored packages (3)

Package maintainers

Upstream advisory: https://github.com/n8n-io/n8n/security/advisories/GHSA-75g8-rv7v-32f7
Published
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created suggestion
  • @LeSuisse ignored package n8n-nodes-carbonejs
  • @LeSuisse deleted
    2 maintainers
    • @gepbird
    • @sweenu
    maintainer.delete
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
Domain allowlist bypass enables credential exfiltration

n8n is an open source workflow automation platform. Prior to 1.121.0, there is a vulnerability in the HTTP Request node's credential domain validation allowed an authenticated attacker to send requests with credentials to unintended domains, potentially leading to credential exfiltration. This only might affect user who have credentials that use wildcard domain patterns (e.g., *.example.com) in the "Allowed domains" setting. This issue is fixed in version 1.121.0 and later.

Affected products

n8n
  • ==< 1.121.0

Matching in nixpkgs

pkgs.n8n

Free and source-available fair-code licensed workflow automation tool

Ignored packages (1)

Package maintainers

Ignored maintainers (1)
Published
Permalink CVE-2026-1470
9.9 CRITICAL
  • CVSS version: 3.1
  • Attack vector (AV): NETWORK
  • Attack complexity (AC): LOW
  • Privileges required (PR): LOW
  • User interaction (UI): NONE
  • Scope (S): CHANGED
  • Confidentiality impact (C): HIGH
  • Integrity impact (I): HIGH
  • Availability impact (A): HIGH
updated 2 months, 3 weeks ago by @LeSuisse Activity log
  • Created suggestion
  • @Scrumplex accepted
  • @LeSuisse published on GitHub
Authenticated users can bypass the Expression sandbox mechanism to achieve full remote code execution on n8n’s main node.

n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations.

Affected products

n8n
  • <1.123.17
  • <2.5.1
  • <2.4.5

Matching in nixpkgs

pkgs.n8n

Free and source-available fair-code licensed workflow automation tool

Package maintainers

Fixed in unstable with https://github.com/NixOS/nixpkgs/pull/484604

Advisory: https://github.com/advisories/GHSA-5xrp-6693-jjx9