Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33665: CWE-287: Improper Authentication in n8n-io n8n

0
High
VulnerabilityCVE-2026-33665cvecve-2026-33665cwe-287
Published: Wed Mar 25 2026 (03/25/2026, 17:32:20 UTC)
Source: CVE Database V5
Vendor/Project: n8n-io
Product: n8n

Description

n8n is an open source workflow automation platform. Prior to versions 2.4.0 and 1.121.0, when LDAP authentication is enabled, n8n automatically linked an LDAP identity to an existing local account if the LDAP email attribute matched the local account's email. An authenticated LDAP user who could control their own LDAP email attribute could set it to match another user's email — including an administrator's — and upon login gain full access to that account. The account linkage persisted even if the LDAP email was later reverted, resulting in a permanent account takeover. LDAP authentication must be configured and active (non-default). The issue has been fixed in n8n versions 2.4.0 and 1.121.0. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Disable LDAP authentication until the instance can be upgraded, restrict LDAP directory permissions so that users cannot modify their own email attributes, and/or audit existing LDAP-linked accounts for unexpected account associations. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 18:16:26 UTC

Technical Analysis

The vulnerability CVE-2026-33665 in n8n, an open-source workflow automation platform, arises from improper authentication handling when LDAP authentication is enabled. In affected versions prior to 2.4.0 and 1.121.0, n8n automatically links an LDAP identity to an existing local account if the LDAP email attribute matches the local account's email. An attacker with authenticated LDAP access can exploit this by changing their LDAP email attribute to impersonate another user’s email, including that of administrators. Upon login, n8n links the attacker’s LDAP identity to the victim’s local account, granting full access. This linkage persists even if the LDAP email attribute is reverted, resulting in a permanent account takeover. The vulnerability requires LDAP authentication to be configured and active, which is not the default setting. The issue stems from insufficient verification of the LDAP email attribute's integrity and the automatic account linkage logic. The vulnerability has a CVSS 4.0 score of 8.8, reflecting high impact on confidentiality and integrity with low attack complexity and no user interaction required beyond authentication. The fix involves updating to n8n versions 2.4.0 or 1.121.0 or later, where the account linkage logic has been corrected to prevent unauthorized account takeover. Temporary mitigations include disabling LDAP authentication, restricting LDAP directory permissions to prevent users from modifying their own email attributes, and auditing existing LDAP-linked accounts for suspicious associations. However, these mitigations do not fully eliminate the risk and should be considered short-term measures until patching is possible.

Potential Impact

This vulnerability allows an authenticated LDAP user to escalate privileges by taking over any local account, including administrators, leading to full compromise of the n8n instance. The attacker gains unauthorized access to workflows, automation processes, and potentially sensitive data managed within n8n. This can result in data breaches, unauthorized modifications, disruption of automated business processes, and lateral movement within the network. Since the account linkage is permanent, even reverting LDAP attributes does not restore security, increasing the risk of persistent compromise. Organizations relying on n8n for critical automation workflows face significant confidentiality and integrity risks. The ease of exploitation combined with the high privileges that can be gained makes this a critical threat to organizations using LDAP authentication with vulnerable n8n versions.

Mitigation Recommendations

1. Upgrade n8n to version 2.4.0, 1.121.0, or later immediately to apply the official fix. 2. If upgrading is not feasible immediately, disable LDAP authentication to prevent exploitation. 3. Restrict LDAP directory permissions to prevent users from modifying their own email attributes, thereby blocking the primary attack vector. 4. Conduct a thorough audit of all LDAP-linked accounts in n8n to identify and remediate any unauthorized account linkages or suspicious activity. 5. Implement monitoring and alerting on LDAP attribute changes and n8n login events to detect potential exploitation attempts. 6. Review and harden n8n’s authentication and user management policies to ensure no other automatic linkage mechanisms can be abused. 7. Educate administrators and users about the risk and signs of compromise related to LDAP authentication misuse. These steps combined provide a layered defense until the patch can be applied.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T15:23:42.220Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c422f4f4197a8e3b7492f1

Added to database: 3/25/2026, 6:01:24 PM

Last enriched: 3/25/2026, 6:16:26 PM

Last updated: 3/26/2026, 5:28:00 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses