Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33663: CWE-639: Authorization Bypass Through User-Controlled Key in n8n-io n8n

0
High
VulnerabilityCVE-2026-33663cvecve-2026-33663cwe-639
Published: Wed Mar 25 2026 (03/25/2026, 17:11:09 UTC)
Source: CVE Database V5
Vendor/Project: n8n-io
Product: n8n

Description

n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.13.3, and 1.123.27, an authenticated user with the `global:member` role could exploit chained authorization flaws in n8n's credential pipeline to steal plaintext secrets from generic HTTP credentials (`httpBasicAuth`, `httpHeaderAuth`, `httpQueryAuth`) belonging to other users on the same instance. The attack abuses a name-based credential resolution path that does not enforce ownership or project scope, combined with a bypass in the credentials permission checker that causes generic HTTP credential types to be skipped during pre-execution validation. Together, these flaws allow a member-role user to resolve another user's credential ID and execute a workflow that decrypts and uses that credential without authorization. Native integration credential types (e.g. `slackApi`, `openAiApi`, `postgres`) are not affected by this issue. This vulnerability affects Community Edition only. Enterprise Edition has additional permission gates on workflow creation and execution that independently block this attack chain. The issue has been fixed in n8n versions 1.123.27, 2.13.3, and 2.14.1. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Restrict instance access to fully trusted users only, and/or audit credentials stored on the instance and rotate any generic HTTP credentials (`httpBasicAuth`, `httpHeaderAuth`, `httpQueryAuth`) that may have been exposed. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 18:01:05 UTC

Technical Analysis

CVE-2026-33663 targets n8n, an open-source workflow automation platform widely used for integrating various services. The vulnerability specifically affects the Community Edition prior to versions 1.123.27, 2.13.3, and 2.14.1. It involves an authorization bypass through a user-controlled key in the credential pipeline. An authenticated user with the 'global:member' role can chain two flaws: first, a name-based credential resolution path that does not enforce ownership or project scope, allowing the user to reference credentials belonging to others; second, a bypass in the credentials permission checker that skips generic HTTP credential types during pre-execution validation. This combination enables the attacker to resolve another user's credential ID and execute workflows that decrypt and use those credentials without proper authorization. The affected credential types are generic HTTP credentials such as httpBasicAuth, httpHeaderAuth, and httpQueryAuth. Importantly, native integration credential types like slackApi, openAiApi, and postgres are not vulnerable. The Enterprise Edition mitigates this risk through additional permission gates on workflow creation and execution, which block this attack chain. The vulnerability has a CVSS v4.0 score of 8.5, indicating high severity, with network attack vector, low complexity, no authentication required beyond member role, and high impact on confidentiality. No public exploits have been reported yet. The recommended remediation is to upgrade to fixed versions 1.123.26, 2.13.3, or 2.14.1 or later. If immediate upgrade is not feasible, administrators should restrict instance access to fully trusted users and audit and rotate any potentially exposed generic HTTP credentials. These mitigations reduce risk but do not fully resolve the vulnerability.

Potential Impact

The vulnerability allows an authenticated user with limited privileges (global:member role) to access plaintext secrets of other users' generic HTTP credentials on the same n8n instance. This can lead to unauthorized disclosure of sensitive information such as API keys, authentication headers, or query parameters used in workflows. Attackers can leverage these stolen credentials to impersonate other users, access external services, or escalate privileges within integrated systems. Since n8n is often used to automate workflows involving critical business applications and cloud services, exposure of these credentials can compromise confidentiality and potentially integrity of connected systems. The impact is confined to Community Edition users, as Enterprise Edition includes additional controls. Organizations running vulnerable versions risk insider threats or compromised user accounts leading to data breaches, service disruptions, or lateral movement. The attack requires only member-level authentication and no user interaction, increasing the likelihood of exploitation in multi-tenant or shared environments. Although no exploits are known in the wild yet, the high CVSS score and ease of exploitation make this a significant risk for organizations relying on n8n Community Edition for automation.

Mitigation Recommendations

1. Upgrade n8n Community Edition instances immediately to version 1.123.26, 2.13.3, 2.14.1, or later to apply the official fix. 2. If upgrading is not immediately possible, restrict access to the n8n instance to fully trusted users only, minimizing the risk of malicious insiders exploiting the vulnerability. 3. Audit all generic HTTP credentials (httpBasicAuth, httpHeaderAuth, httpQueryAuth) stored on the instance and rotate any that may have been exposed or are in use by multiple users. 4. Implement strict role-based access controls and monitor user activities for unusual workflow executions that may indicate abuse of credentials. 5. Consider migrating sensitive workflows to the Enterprise Edition, which includes additional permission gates preventing this attack chain. 6. Regularly review and update credential management policies to avoid sharing or reusing generic HTTP credentials across users. 7. Enable detailed logging and alerting on credential access and workflow executions to detect potential exploitation attempts. 8. Educate users about the risks of credential exposure and encourage prompt reporting of suspicious activities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T15:23:42.219Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c41f52f4197a8e3b733a34

Added to database: 3/25/2026, 5:45:54 PM

Last enriched: 3/25/2026, 6:01:05 PM

Last updated: 3/26/2026, 5:40:18 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses