Impact
This vulnerability enables an authenticated user with workflow creation or editing rights to embed arbitrary scripts into pages generated by the n8n application. When other users view pages rendered by a malicious workflow, the injected code runs in their browsers, giving the attacker full control over their session and the ability to log into the system as them. The issue is a classic example of Cross‑Site Scripting, classified as CWE‑79 and CWE‑80.
Affected Systems
n8n‑io’s n8n workflow automation platform is affected. Versions before 2.10.1, 2.9.3, and 1.123.22 contain the flaw; these should be considered vulnerable until an authorized upgrade is applied.
Risk and Exploitability
The CVSS score of 8.5 indicates high severity, but the EPSS score of less than 1 % suggests exploitation is currently rare. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is through a web‑based interface used by an authenticated user to create or edit workflows, which is inferred from the description. If exploited, attackers can hijack user sessions and compromise account integrity. The risk remains moderate due to low exploitation probability, yet the potential impact warrants urgent remediation.
OpenCVE Enrichment
Github GHSA