Description
n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.13.3, and 1.123.26, an authenticated user with permission to create or modify workflows could use the Merge node's "Combine by SQL" mode to read local files on the n8n host and achieve remote code execution. The AlaSQL sandbox did not sufficiently restrict certain SQL statements, allowing an attacker to access sensitive files on the server or even compromise the instance. The issue has been fixed in n8n versions 2.14.1, 2.13.3, and 1.123.26. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only, and/or disable the Merge node by adding `n8n-nodes-base.merge` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
Published: 2026-03-25
Score: 9.4 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Patch Now
AI Analysis

Impact

Under the Merge node’s "Combine by SQL" mode in n8n, the insecure AlaSQL sandbox allowed an authenticated user with workflow modification rights to execute arbitrary SQL that read local files or invoked system commands. This flaw is a classic SQL injection that bypasses sandbox restrictions, giving the attacker read and exec capabilities on the host. The effect is remote code execution, enabling full compromise of the n8n instance and potentially the underlying operating system.

Affected Systems

The vulnerability applies to all n8n-io installations that run versions older than 2.14.1, 2.13.3, or 1.123.26. Users and administrators of these legacy releases are directly impacted; newer releases are not affected.

Risk and Exploitability

With a CVSS base score of 9.4 the flaw is rated critical. No EPSS score is available, and the vulnerability is not listed as a known exploited vulnerability by CISA, but the high severity and requirement for authenticated access suggest that exploitation is plausible in environments with permissive workflow permissions. The most likely attack path is an attacker who gains the right to create or edit workflows, then crafts a malicious Merge node that reads server files or runs commands. Prompt remediation via a patch or temporary restriction of permissions is essential.

Generated by OpenCVE AI on March 25, 2026 at 19:43 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the n8n platform to version 2.14.1, 2.13.3, or 1.123.26 or later.
  • If an upgrade is not feasible immediately, limit workflow creation and editing rights to trusted users only, and/or disable the Merge node by setting the NODES_EXCLUDE environment variable to include n8n-nodes-base.merge.

Generated by OpenCVE AI on March 25, 2026 at 19:43 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-58qr-rcgv-642v n8n has Multiple Remote Code Execution Vulnerabilities in Merge Node AlaSQL SQL Mode
History

Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared N8n
N8n n8n
Vendors & Products N8n
N8n n8n

Wed, 25 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
Description n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.13.3, and 1.123.26, an authenticated user with permission to create or modify workflows could use the Merge node's "Combine by SQL" mode to read local files on the n8n host and achieve remote code execution. The AlaSQL sandbox did not sufficiently restrict certain SQL statements, allowing an attacker to access sensitive files on the server or even compromise the instance. The issue has been fixed in n8n versions 2.14.1, 2.13.3, and 1.123.26. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only, and/or disable the Merge node by adding `n8n-nodes-base.merge` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
Title n8n Has Multiple Remote Code Execution Vulnerabilities in Merge Node AlaSQL SQL Mode
Weaknesses CWE-94
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-28T01:27:05.337Z

Reserved: 2026-03-23T15:23:42.219Z

Link: CVE-2026-33660

cve-icon Vulnrichment

Updated: 2026-03-28T01:26:59.810Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T18:16:32.080

Modified: 2026-03-26T15:13:15.790

Link: CVE-2026-33660

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T11:34:21Z

Weaknesses