Remote Code Execution Vulnerability in n8n Workflow Automation Platform
CVE-2026-33660

9.4CRITICAL

Key Information:

Vendor

N8n-io

Status
Vendor
CVE Published:
25 March 2026

What is CVE-2026-33660?

n8n is a popular open-source workflow automation platform that has been found to have a vulnerability allowing authenticated users to exploit the Merge node's 'Combine by SQL' feature. This flaw could let attackers read local files on the host and execute arbitrary code remotely. The AlaSQL sandbox used by n8n lacks sufficient restrictions on certain SQL commands, potentially leading to unauthorized access to sensitive data. To protect your instance, it is critical to upgrade to n8n versions 2.14.1, 2.13.3, or 1.123.26. If immediate upgrading isn't feasible, consider temporarily limiting workflow creation permissions to trusted users and exclude the Merge node from operations to mitigate risks.

Affected Version(s)

n8n < 1.123.27 < 1.123.27

n8n >= 2.0.0-rc.0, < 2.13.3 < 2.0.0-rc.0, 2.13.3

n8n = 2.14.0 = 2.14.0

References

CVSS V4

Score:
9.4
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.