Skip to content
CVSS 8.8 · HIGH

CVE-2026-42231

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, a flaw in the xml2js library used to parse XML request bodies in n8n's webhook handler allowed prototype pollution via a crafted XML payload. An authenticated user with permission to create or modify workflows could exploit this to pollute the JavaScript object prototype and, by chaining the pollution with the Git node's SSH operations, achieve remote code execution on the n8n host. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.

View on NVD

Analysis

n8n versions prior to 1.123.32, 2.17.4, and 2.18.1 are vulnerable to an exploit path that allows remote code execution. An authenticated user can use a crafted XML payload in a webhook to pollute the JavaScript prototype and execute arbitrary code via the Git node. If you host n8n for your team's automation, you should update to a patched version immediately.

Severity

Score: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Weakness (CWE): CWE-1321

EPSS

Probability of exploitation (next 30 days): 0.0048 (0.5%)
Percentile: 64.9%
EPSS: 2026-05-06

Affects

n8n:n8n

Technical description

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, a flaw in the xml2js library used to parse XML request bodies in n8n's webhook handler allowed prototype pollution via a crafted XML payload. An authenticated user with permission to create or modify workflows could exploit this to pollute the JavaScript object prototype and, by chaining the pollution with the Git node's SSH operations, achieve remote code execution on the n8n host. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.

Published: 5/4/2026, 7:16:05 PM
Last modified: 5/6/2026, 5:14:03 PM

References

HomeEventsBlogResourcesTeam