Description
n8n is an open source workflow automation platform. Prior to versions 2.4.0 and 1.121.0, when LDAP authentication is enabled, n8n automatically linked an LDAP identity to an existing local account if the LDAP email attribute matched the local account's email. An authenticated LDAP user who could control their own LDAP email attribute could set it to match another user's email — including an administrator's — and upon login gain full access to that account. The account linkage persisted even if the LDAP email was later reverted, resulting in a permanent account takeover. LDAP authentication must be configured and active (non-default). The issue has been fixed in n8n versions 2.4.0 and 1.121.0. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Disable LDAP authentication until the instance can be upgraded, restrict LDAP directory permissions so that users cannot modify their own email attributes, and/or audit existing LDAP-linked accounts for unexpected account associations. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
Published: 2026-03-25
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Account takeover via LDAP email linking
Action: Patch Now
AI Analysis

Impact

A flaw in the LDAP authentication configuration of the n8n platform allows a user who can control their own LDAP email attribute to match the email of another account, including administrators. When the email values coincide, n8n automatically links the LDAP identity to the existing local account, granting the attacker full access to that account. The linkage persists even after the email is changed back, resulting in a permanent takeover. This results in unauthorized privilege escalation and full control over the victim account.

Affected Systems

Vendors n8n‑io, product n8n (open‑source workflow automation platform). Versions prior to 2.4.0 and 1.121.0 are vulnerable; later releases contain the fix.

Risk and Exploitability

The vulnerability scores 8.8 on CVSS, indicating high severity. Exploitation requires the attacker to be authenticated to the LDAP directory and have permission to modify the email attribute of their own LDAP entry. Once those conditions are met, the attacker can quickly link to any target account with a matching email. The flaw is not already present in the CISA KEV catalog and EPSS data is unavailable, but the attack path is straightforward and the impact is severe, warranting immediate attention.

Generated by OpenCVE AI on March 25, 2026 at 19:42 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to n8n version 2.4.0 or 1.121.0 or later
  • Disable LDAP authentication until the upgrade can be applied
  • Restrict LDAP directory permissions to prevent users from changing their own email attribute
  • Audit existing LDAP‑linked accounts for unexpected associations

Generated by OpenCVE AI on March 25, 2026 at 19:42 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Github GHSA Github GHSA GHSA-c545-x2rh-82fc n8n: LDAP Email-Based Account Linking Allows Privilege Escalation and Account Takeover
History

Fri, 27 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared N8n
N8n n8n
Vendors & Products N8n
N8n n8n

Wed, 25 Mar 2026 18:00:00 +0000

Type Values Removed Values Added
Description n8n is an open source workflow automation platform. Prior to versions 2.4.0 and 1.121.0, when LDAP authentication is enabled, n8n automatically linked an LDAP identity to an existing local account if the LDAP email attribute matched the local account's email. An authenticated LDAP user who could control their own LDAP email attribute could set it to match another user's email — including an administrator's — and upon login gain full access to that account. The account linkage persisted even if the LDAP email was later reverted, resulting in a permanent account takeover. LDAP authentication must be configured and active (non-default). The issue has been fixed in n8n versions 2.4.0 and 1.121.0. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Disable LDAP authentication until the instance can be upgraded, restrict LDAP directory permissions so that users cannot modify their own email attributes, and/or audit existing LDAP-linked accounts for unexpected account associations. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
Title n8n: LDAP Email-Based Account Linking Allows Privilege Escalation and Account Takeover
Weaknesses CWE-287
References
Metrics cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:N/SC:H/SI:H/SA:L'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-27T14:55:50.620Z

Reserved: 2026-03-23T15:23:42.220Z

Link: CVE-2026-33665

cve-icon Vulnrichment

Updated: 2026-03-27T14:55:46.790Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T18:16:32.390

Modified: 2026-03-26T15:13:15.790

Link: CVE-2026-33665

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T11:34:19Z

Weaknesses