SQL Injection Vulnerability in n8n Workflow Automation Platform
CVE-2026-33713

8.7HIGH

Key Information:

Vendor

N8n-io

Status
Vendor
CVE Published:
25 March 2026

What is CVE-2026-33713?

The n8n workflow automation platform is susceptible to a SQL injection vulnerability that affects authenticated users with workflow creation or editing permissions. Exploiting this flaw enables attackers to manipulate single SQL statements in default SQLite databases or execute multi-statement queries in PostgreSQL deployments, which can lead to data modification or deletion. To mitigate this risk, users are encouraged to upgrade to versions 1.123.26, 2.13.3, or 2.14.1 or employ measures such as restricting editing permissions and disabling the Data Table node temporarily. These precautions should be viewed as interim solutions until a full upgrade can be implemented.

Affected Version(s)

n8n < 1.123.26 < 1.123.26

n8n >= 2.0.0-rc.0, < 2.13.3 < 2.0.0-rc.0, 2.13.3

n8n = 2.14.0 = 2.14.0

References

CVSS V4

Score:
8.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.