Impact
The flaw in n8n’s LDAP node allows LDAP metacharacters to bypass escape filtering when user‑controlled input is inserted via expressions, enabling an attacker to craft malicious LDAP search filters. This can result in the retrieval of unintended LDAP records or the disruption of authentication checks built into a workflow. The weakness is a classic LDAP injection type vulnerability, classified as CWE‑90.
Affected Systems
n8n-io’s n8n platform is affected. Vulnerable releases fall below version 1.123.27, 2.13.3, and 2.14.1. Users running any of these prior releases should consider them at risk if the LDAP node is used with external input in expressions.
Risk and Exploitability
The vulnerability carries a CVSS score of 6.3, indicating medium severity. No EPSS score is provided, and the issue is not currently listed in CISA’s KEV catalog. Exploitation requires a workflow that employs the LDAP node with user‑controlled data supplied via expressions—such as from a form or webhook—allowing attackers to manipulate the LDAP filter. The attack vector is thus indirect and limited to configured workflows, but once triggered can expose sensitive data or bypass authentication blocks.
OpenCVE Enrichment
Github GHSA