Prototype Pollution Vulnerability in n8n Workflow Automation Platform
CVE-2026-33696

9.4CRITICAL

Key Information:

Vendor

N8n-io

Status
Vendor
CVE Published:
25 March 2026

What is CVE-2026-33696?

n8n, an open source workflow automation platform, has a vulnerability that allows authenticated users to exploit prototype pollution in the XML and GSuiteAdmin nodes. By providing crafted parameters during node configuration, malicious users could manipulate the Object.prototype, enabling potential remote code execution on the n8n instance. This vulnerability has been addressed in versions 2.14.1, 2.13.3, and 1.123.27. Users are advised to upgrade promptly. For those unable to upgrade immediately, it is recommended to limit workflow permissions and consider disabling the XML node by adding n8n-nodes-base.xml to the NODES_EXCLUDE environment variable as temporary mitigation strategies.

Affected Version(s)

n8n < 1.123.27 < 1.123.27

n8n >= 2.0.0-rc.0, < 2.13.3 < 2.0.0-rc.0, 2.13.3

n8n = 2.14.0 = 2.14.0

References

CVSS V4

Score:
9.4
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.