Impact
n8n, a workflow automation platform, contains a command‑injection flaw in its community package installation routine. The flaw arises because user‑supplied package names are passed directly to the operating‑system shell without adequate validation, allowing an attacker who can authenticate as an administrator to run arbitrary system commands. This vulnerability compromises confidentiality, integrity, and availability of the host system and aligns with CWE‑20 (Improper Input Validation) and CWE‑78 (OS Command Injection).
Affected Systems
Versions of n8n from 0.187.0 up to, but not including, 1.120.3 are affected. Any deployment that enables community package installation and grants administrative privileges to users is vulnerable because the flaw exists regardless of the overall deployment size or network exposure.
Risk and Exploitability
The CVSS base score of 9.4 marks this as critical. With an EPSS score of less than 1%, the probability of a successful exploit is currently low, but the lack of presence in the CISA KEV catalog and the requirement for authenticated administrative access mean that a compromised account can achieve full host compromise. Attackers would initiate a package installation via the web interface or API, supply malicious input, and have the system execute the payload with administrative privileges.
OpenCVE Enrichment
Github GHSA