LDAP Authentication Vulnerability in n8n Workflow Automation by n8n.io
CVE-2026-33665

8.8HIGH

Key Information:

Vendor

N8n-io

Status
Vendor
CVE Published:
25 March 2026

What is CVE-2026-33665?

n8n is an open-source workflow automation platform that has a vulnerability associated with its LDAP authentication feature. When LDAP authentication is enabled prior to versions 2.4.0 and 1.121.0, the system allows automatic linking of an LDAP identity to an existing local account if the LDAP email attribute matches that of the local account. Consequently, an authenticated LDAP user can gain unauthorized access to other accounts, including those of administrators, if they control their email attribute. This vulnerability results in a persistent account takeover, as the linkage remains even if the LDAP email is changed back. To mitigate this risk, users are strongly encouraged to upgrade to the patched versions of n8n. Temporary mitigations include disabling LDAP authentication, restricting directory permissions, and auditing linked accounts, though these do not fully eliminate the risk.

Affected Version(s)

n8n < 1.121.0 < 1.121.0

n8n >= 2.0.0-rc.0, < 2.4.0 < 2.0.0-rc.0, 2.4.0

References

CVSS V4

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.