Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33713: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in n8n-io n8n

0
High
VulnerabilityCVE-2026-33713cvecve-2026-33713cwe-89
Published: Wed Mar 25 2026 (03/25/2026, 17:47:44 UTC)
Source: CVE Database V5
Vendor/Project: n8n-io
Product: n8n

Description

n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.13.3, and 1.123.26, an authenticated user with permission to create or modify workflows could exploit a SQL injection vulnerability in the Data Table Get node. On default SQLite DB, single statements can be manipulated and the attack surface is practically limited. On PostgreSQL deployments, multi-statement execution is possible, enabling data modification and deletion. The issue has been fixed in n8n versions 1.123.26, 2.13.3, and 2.14.1. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only, disable the Data Table node by adding `n8n-nodes-base.dataTable` to the `NODES_EXCLUDE` environment variable, and/or review existing workflows for Data Table Get nodes where `orderByColumn` is set to an expression that incorporates external or user-supplied input. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/25/2026, 18:15:56 UTC

Technical Analysis

CVE-2026-33713 is an SQL injection vulnerability classified under CWE-89 affecting the open-source workflow automation platform n8n. The flaw exists in the Data Table Get node, which improperly neutralizes special elements in SQL commands constructed from user-controlled input. Authenticated users with permissions to create or modify workflows can inject malicious SQL code. On default SQLite databases, the injection is limited to single SQL statements, restricting the attack surface primarily to data retrieval manipulation. However, on PostgreSQL deployments, the vulnerability is more severe because multi-statement execution is possible, enabling attackers to perform unauthorized data modifications and deletions. The vulnerability requires no user interaction beyond authentication and workflow editing privileges, making it relatively easy to exploit in environments where such permissions are granted. The issue affects n8n versions prior to 1.123.26, versions from 2.0.0-rc.0 up to but not including 2.13.3, and version 2.14.0. The vendor has released patches in versions 1.123.26, 2.13.3, and 2.14.1 to remediate the vulnerability. Until upgrades can be applied, administrators are advised to limit workflow editing permissions to trusted users, disable the Data Table node via environment variable configuration, and audit existing workflows for unsafe use of the orderByColumn parameter that incorporates external input. These mitigations reduce but do not eliminate the risk. The vulnerability has a CVSS 4.0 base score of 8.7, reflecting high severity due to network attack vector, low attack complexity, no required privileges beyond workflow editing, no user interaction, and high impact on confidentiality, integrity, and availability. There are no known exploits in the wild at this time.

Potential Impact

This vulnerability can lead to unauthorized data access, modification, and deletion within n8n deployments, severely impacting the confidentiality, integrity, and availability of workflow data and potentially connected systems. On PostgreSQL-backed instances, attackers can execute multiple SQL statements, increasing the risk of destructive actions such as data corruption or deletion. Organizations relying on n8n for critical automation workflows may experience operational disruption, data loss, and potential compliance violations. Since exploitation requires only authenticated workflow editing permissions, insider threats or compromised user accounts pose a significant risk. The vulnerability could also be leveraged as a foothold for further lateral movement within an organization's infrastructure. The impact is especially critical for organizations using n8n in production environments with PostgreSQL databases, where the attack surface and damage potential are greater.

Mitigation Recommendations

1. Upgrade n8n installations immediately to versions 1.123.26, 2.13.3, 2.14.1, or later to apply the official patch that fully remediates the vulnerability. 2. Restrict workflow creation and modification permissions strictly to fully trusted and vetted users to reduce the risk of exploitation by insiders or compromised accounts. 3. Temporarily disable the Data Table node by adding 'n8n-nodes-base.dataTable' to the NODES_EXCLUDE environment variable to prevent use of the vulnerable functionality. 4. Conduct a thorough audit of existing workflows, focusing on Data Table Get nodes where the 'orderByColumn' parameter uses expressions incorporating external or user-supplied input, and refactor or remove unsafe constructs. 5. Implement strong authentication and monitoring around user accounts with workflow editing privileges to detect and prevent unauthorized access. 6. Consider deploying database-level protections such as query parameterization and strict role-based access controls to limit the impact of potential injection attempts. 7. Monitor n8n logs and database activity for suspicious queries indicative of exploitation attempts. These measures, combined with patching, provide a layered defense against this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-23T17:06:05.747Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69c422f4f4197a8e3b7492f7

Added to database: 3/25/2026, 6:01:24 PM

Last enriched: 3/25/2026, 6:15:56 PM

Last updated: 3/26/2026, 5:33:00 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses