Nixpkgs Security Tracker

Login with GitHub

Suggestions search

With package: n8n

Found 13 matching suggestions

Published
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse removed
    2 maintainers
    • @gepbird
    • @sweenu
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n Has an Expression Escape Vulnerability Leading to RCE

n8n is an open source workflow automation platform. Prior to versions 1.123.17 and 2.5.2, an authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. This issue has been patched in versions 1.123.17 and 2.5.2.

Affected products

n8n
  • ==< 2.5.2
  • ==< 1.123.17

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
Fixed in https://github.com/NixOS/nixpkgs/pull/477990 (25.11) and https://github.com/NixOS/nixpkgs/pull/477422 (unstable)
Published
updated 2 weeks, 2 days ago by @LeSuisse Activity log
  • Created automatic suggestion
  • @LeSuisse removed package n8n-nodes-carbonejs
  • @LeSuisse removed
    2 maintainers
    • @gepbird
    • @sweenu
  • @LeSuisse accepted
  • @LeSuisse published on GitHub
n8n Improper File Access Controls Allow Arbitrary File Read by Authenticated Users

n8n is an open source workflow automation platform. Prior to versions 1.123.18 and 2.5.0, a vulnerability in the file access controls allows authenticated users with permission to create or modify workflows to read sensitive files from the n8n host system. This can be exploited to obtain critical configuration data and user credentials, leading to complete account takeover of any user on the instance. This issue has been patched in versions 1.123.18 and 2.5.0.

Affected products

n8n
  • ==< 2.5.0
  • ==< 1.123.18

Matching in nixpkgs

Package maintainers

Ignored maintainers (1)
Fixed in https://github.com/NixOS/nixpkgs/pull/477990 (25.11) and https://github.com/NixOS/nixpkgs/pull/477422 (unstable)
Published
updated 1 month ago by @mweinelt Activity log
  • Created automatic suggestion
  • @mweinelt accepted
  • @mweinelt published on GitHub
Sandbox escape in n8n Python task runner allows for arbitrary code execution on the underlying host.

Using string formatting and exception handling, an attacker may bypass n8n's python-task-executor sandbox restrictions and run arbitrary unrestricted Python code in the underlying operating system. The vulnerability can be exploited via the Code block by an authenticated user with basic permissions and can lead to a full n8n instance takeover on instances operating under "Internal" execution mode. If the instance is operating under the "External" execution mode (ex. n8n's official Docker image) - arbitrary code execution occurs inside a Sidecar container and not the main node, which significantly reduces the vulnerability impact.

Affected products

n8n
  • <1.123.14
  • <2.3.5
  • <2.4.2

Matching in nixpkgs

pkgs.n8n

Free and source-available fair-code licensed workflow automation tool

Package maintainers