Description
n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.13.3, and 1.123.26, an authenticated user with permission to create or modify workflows could use the Merge node's "Combine by SQL" mode to read local files on the n8n host and achieve remote code execution. The AlaSQL sandbox did not sufficiently restrict certain SQL statements, allowing an attacker to access sensitive files on the server or even compromise the instance. The issue has been fixed in n8n versions 2.14.1, 2.13.3, and 1.123.26. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only, and/or disable the Merge node by adding `n8n-nodes-base.merge` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
Published: 2026-03-25
Score: 9.4 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

An authenticated user who can create or modify workflows may use the Merge node’s "Combine by SQL" mode to execute arbitrary SQL statements. The underlying AlaSQL sandbox fails to restrict certain SQL commands, allowing the attacker to read local files and ultimately execute code on the n8n host. The vulnerability is classified as a high‐severity remote code execution flaw that can compromise confidentiality, integrity and availability of the entire system. It maps to well‑known weaknesses such as SQL injection (CWE‑89) and code injection via dynamic execution (CWE‑94).

Affected Systems

The flaw affects n8n workflow automation platform versions prior to 2.14.1, 2.13.3 and 1.123.26. Users running n8n 2.14.0, any 2.13.x version earlier than 2.13.3, or 1.123.25 and earlier are impacted and must consider remediation. The platform runs on Node.js, and the vulnerability is tied to the Merge node implementation contained in the open source code base.

Risk and Exploitability

The CVSS score of 9.4 reflects the severe impact of the vulnerability, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The issue does not appear in the CISA KEV catalog, but the requirement of an authenticated user with workflow creation rights increases the attack surface to internal or compromised accounts. An attacker with those permissions can trigger the vulnerable code path and gain full control over the host. Therefore the risk is high for organizations where such user roles are widely distributed, and precautionary steps should be taken immediately.

Generated by OpenCVE AI on March 30, 2026 at 16:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to n8n 2.14.1 or later (or 2.13.3 or 1.123.26).
  • If an upgrade is not yet possible, restrict workflow creation and editing permissions to trusted users only.
  • As a temporary measure, disable the Merge node by adding n8n-nodes-base.merge to the NODES_EXCLUDE environment variable.

Generated by OpenCVE AI on March 30, 2026 at 16:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-58qr-rcgv-642v n8n has Multiple Remote Code Execution Vulnerabilities in Merge Node AlaSQL SQL Mode
History

Mon, 30 Mar 2026 15:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-89
CPEs cpe:2.3:a:n8n:n8n:*:*:*:*:*:node.js:*:*
cpe:2.3:a:n8n:n8n:2.14.0:*:*:*:*:node.js:*:*
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Sat, 28 Mar 2026 03:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared N8n
N8n n8n
Vendors & Products N8n
N8n n8n

Wed, 25 Mar 2026 17:45:00 +0000

Type Values Removed Values Added
Description n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.13.3, and 1.123.26, an authenticated user with permission to create or modify workflows could use the Merge node's "Combine by SQL" mode to read local files on the n8n host and achieve remote code execution. The AlaSQL sandbox did not sufficiently restrict certain SQL statements, allowing an attacker to access sensitive files on the server or even compromise the instance. The issue has been fixed in n8n versions 2.14.1, 2.13.3, and 1.123.26. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only, and/or disable the Merge node by adding `n8n-nodes-base.merge` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
Title n8n Has Multiple Remote Code Execution Vulnerabilities in Merge Node AlaSQL SQL Mode
Weaknesses CWE-94
References
Metrics cvssV4_0

{'score': 9.4, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-28T01:27:05.337Z

Reserved: 2026-03-23T15:23:42.219Z

Link: CVE-2026-33660

cve-icon Vulnrichment

Updated: 2026-03-28T01:26:59.810Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-25T18:16:32.080

Modified: 2026-03-30T14:54:07.600

Link: CVE-2026-33660

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T20:57:58Z

Weaknesses