N8n

N8n

53 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.03%
  • Veröffentlicht 18.01.2026 15:37:07
  • Zuletzt bearbeitet 10.02.2026 17:23:41

Using string formatting and exception handling, an attacker may bypass n8n's python-task-executor sandbox restrictions and run arbitrary unrestricted Python code in the underlying operating system. The vulnerability can be exploited via the Code blo...

  • EPSS 0.04%
  • Veröffentlicht 13.01.2026 18:43:20
  • Zuletzt bearbeitet 16.01.2026 18:47:32

n8n is an open source workflow automation platform. From 1.36.0 to before 2.2.0, the Webhook node’s IP whitelist validation performed partial string matching instead of exact IP comparison. As a result, an incoming request could be accepted if the so...

  • EPSS 0.02%
  • Veröffentlicht 08.01.2026 09:56:04
  • Zuletzt bearbeitet 20.01.2026 15:09:07

n8n is an open source workflow automation platform. In versions from 0.150.0 to before 2.2.2, an authentication bypass vulnerability in the Stripe Trigger node allows unauthenticated parties to trigger workflows by sending forged Stripe webhook event...

  • EPSS 14.14%
  • Veröffentlicht 08.01.2026 00:39:58
  • Zuletzt bearbeitet 20.01.2026 15:08:24

n8n is an open source workflow automation platform. In versions 0.121.2 and below, an authenticated attacker may be able to execute malicious code using the n8n service. This could result in full compromise and can impact both self-hosted and n8n Clo...

Medienbericht Exploit
  • EPSS 6.63%
  • Veröffentlicht 07.01.2026 23:57:52
  • Zuletzt bearbeitet 16.01.2026 19:31:34

n8n is an open source workflow automation platform. Versions starting with 1.65.0 and below 1.121.0 enable an attacker to access files on the underlying server through execution of certain form-based workflows. A vulnerable workflow could grant acces...

  • EPSS 0.02%
  • Veröffentlicht 26.12.2025 21:51:12
  • Zuletzt bearbeitet 31.12.2025 21:27:25

n8n is an open source workflow automation platform. Prior to version 2.0.0, in self-hosted n8n instances where the Code node runs in legacy (non-task-runner) JavaScript execution mode, authenticated users with workflow editing access can invoke inter...

Medienbericht
  • EPSS 0.05%
  • Veröffentlicht 26.12.2025 21:49:20
  • Zuletzt bearbeitet 05.01.2026 17:15:46

n8n is an open source workflow automation platform. From version 1.0.0 to before 2.0.0, a sandbox bypass vulnerability exists in the Python Code Node that uses Pyodide. An authenticated user with permission to create or modify workflows can exploit t...

  • EPSS 0.01%
  • Veröffentlicht 26.12.2025 21:48:59
  • Zuletzt bearbeitet 31.12.2025 21:31:37

n8n is an open source workflow automation platform. Prior to version 1.114.0, a stored Cross-Site Scripting (XSS) vulnerability may occur in n8n when using the “Respond to Webhook” node. When this node responds with HTML content containing executable...

Warnung Medienbericht Exploit
  • EPSS 79.16%
  • Veröffentlicht 19.12.2025 22:23:47
  • Zuletzt bearbeitet 11.03.2026 19:40:09

n8n is an open source workflow automation platform. Versions starting with 0.211.0 and prior to 1.120.4, 1.121.1, and 1.122.0 contain a critical Remote Code Execution (RCE) vulnerability in their workflow expression evaluation system. Under certain c...

Exploit
  • EPSS 0.03%
  • Veröffentlicht 08.12.2025 23:35:02
  • Zuletzt bearbeitet 02.01.2026 21:10:59

n8n is an open source workflow automation platform. Versions 0.123.1 through 1.119.1 do not have adequate protections to prevent RCE through the project's pre-commit hooks. The Add Config operation allows workflows to set arbitrary Git configuration ...