Two critical malicious code vulnerabilities threaten automation platform n8n

Several software vulnerabilities threaten the AI-powered automation tool n8n. Security patches are available for download.

listen Print view
A symbolic update bar is filling up.

(Image: AFANASEV IVAN/Shutterstock.com)

1 min. read

Companies that have automated business processes with n8n, among other things, should update the software promptly. If this is not done, attackers can attack systems in several ways.

As stated in the security section of the tool's GitHub website, the developers have closed a total of six security vulnerabilities. Two of them are considered "critical" (CVE-2026-33696, CVE-2026-33660). In the first case, after a prototype pollution attack, malicious code can get onto systems and compromise them. In the second case, this is also possible. This time, because AlaSQL sandbox does not sufficiently restrict certain SQL statements.

Another vulnerability (CVE-2026-33663) is classified as "high" threat level. Here, an authenticated attacker can intercept unencrypted credentials. There are no reports yet that attackers are already exploiting the vulnerabilities. However, this can change quickly. Accordingly, administrators must ensure that the patched versions 1.123.27, 2.13.3, or 2.14.1 are installed.

Videos by heise

In the recent past, the developers have released security updates for n8n twice a month.

(des)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.