n8n: Updates fix critical security vulnerabilities in automation platform

The update was announced to all admins via email; they should apply it promptly. Code injection is a risk.

listen Print view

(Image: Sashkin/Shutterstock.com)

1 min. read

As announced on Monday, the n8n team has now released three new versions for its popular low-code platform. These fix six security vulnerabilities, two of which are critical and allow remote code execution.

The vulnerabilities are:

None of the vulnerabilities currently have a CVE ID, which is why we are using GitHub's own GHSA identifiers.

Videos by heise

Fortunately, neither of the two RCE vulnerabilities is exploitable by unauthenticated users, but administrators of self-hosted n8n instances should apply the patches promptly.

The patched versions are:

  • For version tree 1.x: 1.123.33
  • For the "Stable" version tree: 2.17.5
  • For the "Beta" version tree: 2.18.1

n8n is a popular tool for process automation, but can also be used for security operations. The project has been plagued by severe security vulnerabilities for months, which are actively exploited by attackers.

(cku)

Don't miss any news – follow us on Facebook, LinkedIn or Mastodon.

This article was originally published in German. It was translated with technical assistance and editorially reviewed before publication.