Skip to content
CVSS 8.8 · HIGH

CVE-2026-42231

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, a flaw in the xml2js library used to parse XML request bodies in n8n's webhook handler allowed prototype pollution via a crafted XML payload. An authenticated user with permission to create or modify workflows could exploit this to pollute the JavaScript object prototype and, by chaining the pollution with the Git node's SSH operations, achieve remote code execution on the n8n host. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.

Ver en NVD

Análisis

n8n versions prior to 1.123.32, 2.17.4, and 2.18.1 are vulnerable to an exploit path that allows remote code execution. An authenticated user can use a crafted XML payload in a webhook to pollute the JavaScript prototype and execute arbitrary code via the Git node. If you host n8n for your team's automation, you should update to a patched version immediately.

Severidad

Puntaje: 8.8(HIGH)
Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
AV: NETWORK
AC: LOW
PR: LOW
UI: NONE
S: UNCHANGED
C: HIGH
I: HIGH
A: HIGH
Tipo de falla (CWE): CWE-1321

EPSS

Probabilidad de explotación (próx. 30 días): 0.0048 (0.5%)
Percentil: 64.9%
EPSS: 2026-05-06

Afecta

n8n:n8n

Descripción técnica

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, a flaw in the xml2js library used to parse XML request bodies in n8n's webhook handler allowed prototype pollution via a crafted XML payload. An authenticated user with permission to create or modify workflows could exploit this to pollute the JavaScript object prototype and, by chaining the pollution with the Git node's SSH operations, achieve remote code execution on the n8n host. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.

Publicada: 4/5/2026, 19:16:05
Última modificación: 6/5/2026, 17:14:03

Referencias

InicioEventosBlogRecursosEquipo