Impact
An open source workflow automation platform contains a prototype pollution flaw in its XML and GSuiteAdmin nodes. An attacker who can create or edit workflows can supply crafted parameters that overwrite Object.prototype. This manipulation can lead to arbitrary code execution on the n8n instance, allowing the attacker to compromise confidentiality, integrity, and availability of the server and its data.
Affected Systems
The vulnerability affects the n8n platform produced by n8n-io. All releases before 2.14.1, 2.13.3, and 1.123.27 are impacted; the issue is remedied in those version releases and the versions that follow.
Risk and Exploitability
The CVSS score of 9.4 signals critical severity, while the EPSS score of less than 1% and absence from CISA’s KEV catalog suggest that public exploitation is currently lower risk. Nonetheless, exploitation requires an authenticated user with permission to modify workflows, meaning compromised accounts or privileged users could leverage the flaw. Controllers with any such access must treat this as a high‑risk vulnerability and act promptly.
OpenCVE Enrichment
Github GHSA