Impact
An authenticated user who can create or modify workflows can trigger the JavaScript Task Runner to allocate uninitialized memory buffers. These buffers may contain residual data from the same Node.js process, including secrets, tokens, or other sensitive information. The flaw is a source of information disclosure, classified by CWE-908.
Affected Systems
The vulnerability affects the n8n-io n8n automation platform. Versions prior to 1.123.22, 2.9.3, and 2.10.1 are susceptible. The issue was fixed in the corresponding patch releases, which should be applied to remove the risk.
Risk and Exploitability
The CVSS score of 7.1 indicates moderate severity, while the EPSS score of less than 1% suggests a low likelihood of widespread exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires authentication and the ability to create or edit workflows, and Task Runners must be enabled. Attackers could read residual memory data, potentially exposing confidential information.
OpenCVE Enrichment
Github GHSA