API Exposure Vulnerability in n8n Workflow Automation by n8n.io
CVE-2026-42227

6MEDIUM

Key Information:

Vendor

N8n-io

Status
Vendor
CVE Published:
4 May 2026

What is CVE-2026-42227?

The n8n workflow automation platform features an authorization bypass vulnerability that enables authenticated users with a valid API key to access variables across projects they do not belong to. This occurs by manipulating the projectId parameter in the public API variables endpoint, thus circumventing membership checks implemented in the service layer. If sensitive information such as tokens or credentials were stored using this feature, it is critical to rotate these credentials immediately. The issue affects enterprise license users with multiple projects and enabled variable features, but has been patched in the latest versions.

Affected Version(s)

n8n < 1.123.32 < 1.123.32

n8n >= 2.17.0, < 2.17.4 < 2.17.0, 2.17.4

n8n >= 2.18.0, < 2.18.1 < 2.18.0, 2.18.1

References

CVSS V4

Score:
6
Severity:
MEDIUM
Confidentiality:
High
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.