Impact
n8n includes Snowflake and legacy MySQL v1 nodes that build SQL statements by directly appending user-controlled table names, columns, and update keys without escaping. The flaw allows a malicious actor to inject arbitrary SQL, potentially reading or modifying data in the connected Snowflake or MySQL databases. This is a classic input validation issue, identified as CWE-89. The impact is the exposure of sensitive data and unintended database modifications, but it does not provide direct remote code execution.
Affected Systems
The vulnerability affects the n8n open source workflow automation platform. Versions prior to 1.123.32, 2.17.4, or 2.18.1 are impacted for the Snowflake and legacy MySQL v1 nodes. The product owner is n8n-io under the n8n product line.
Risk and Exploitability
The CVSS score is 5.3, indicating moderate severity. No EPSS score is available and the issue is not listed in the CISA KEV catalog. The likely attack vector requires an adversary that can configure or inject values into the Snowflake or MySQL node definitions, which may be achievable through compromised accounts or by injecting crafted payloads into workflow configurations.
OpenCVE Enrichment