Impact
The flaw exists in the Merge node’s SQL query mode, letting authenticated users who can create or edit workflows write arbitrary files to the server’s file system. If those files contain executable code, the attacker can run code with the privileges of the n8n process, achieving remote code execution. This is an instance of uncontrolled file creation combined with improper permission checks.
Affected Systems
n8n‑io’s n8n workflow automation platform. All releases before 1.118.0 or 2.4.0 are vulnerable; upgrading to these or later versions removes the issue.
Risk and Exploitability
The CVSS score is 9.4, indicating a highly severe vulnerability. The EPSS score is under 1 %, suggesting the current exploitation probability is low but not zero. The vulnerability is not listed in the KEV catalog, so no active exploits are publicly known. Exploitation requires authenticated access to the workflow editor and permission to create or modify workflows; once a malicious file is written, arbitrary code can run on the host.
OpenCVE Enrichment
Github GHSA