CVE-2026-33724: CWE-639: Authorization Bypass Through User-Controlled Key in n8n-io n8n
n8n is an open source workflow automation platform. Prior to version 2.5.0, when the Source Control feature is configured to use SSH, the SSH command used for git operations explicitly disabled host key verification. A network attacker positioned between the n8n instance and the remote Git server could intercept the connection and present a fraudulent host key, potentially injecting malicious content into workflows or intercepting repository data. This issue only affects instances where the Source Control feature has been explicitly enabled and configured to use SSH (non-default). The issue has been fixed in n8n version 2.5.0. Users should upgrade to this version or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Disable the Source Control feature if it is not actively required, and/or restrict network access to ensure the n8n instance communicates with the Git server only over trusted, controlled network paths. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
AI Analysis
Technical Summary
The vulnerability CVE-2026-33724 affects n8n, an open-source workflow automation platform, specifically versions prior to 2.5.0 when the Source Control feature is enabled and configured to use SSH for git operations. In these versions, the SSH command explicitly disables host key verification, a critical security step that ensures the authenticity of the remote Git server. Without host key verification, a network attacker positioned between the n8n instance and the Git server can perform a man-in-the-middle (MITM) attack by presenting a fraudulent SSH host key. This enables the attacker to intercept or manipulate the git communication channel. Potential impacts include injecting malicious code or workflows into the repository, which could then be executed by the n8n platform, or exfiltrating sensitive repository data. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key), highlighting the risk of unauthorized access due to improper validation of SSH keys. Exploitation does not require authentication or user interaction but does require the Source Control feature to be explicitly enabled and configured to use SSH, which is not the default setting. The issue was publicly disclosed on March 25, 2026, and fixed in n8n version 2.5.0. Until upgrading, recommended mitigations include disabling the Source Control feature if not needed and restricting network access to ensure communication with the Git server occurs only over trusted and controlled network paths. These mitigations reduce but do not eliminate the risk. No known exploits are reported in the wild as of the publication date. The CVSS v4.0 base score is 6.3, reflecting a medium severity with network attack vector, high attack complexity, and partial impact on confidentiality and integrity.
Potential Impact
This vulnerability poses a significant risk to organizations using n8n with the Source Control feature enabled over SSH. Successful exploitation allows an attacker to perform man-in-the-middle attacks, potentially injecting malicious workflows that could execute arbitrary actions within the automation platform. This can lead to unauthorized data access, manipulation of automated processes, and potential lateral movement within the network. Confidentiality is impacted by possible interception of repository data, and integrity is compromised by unauthorized code injection. Availability is less directly affected but could be impacted if malicious workflows disrupt normal operations. Organizations relying on automated workflows for critical business processes or sensitive data handling are at higher risk. The attack requires network positioning capabilities, which may limit exposure to attackers with internal network access or those able to intercept traffic on public or poorly secured networks. However, the lack of authentication or user interaction requirements lowers the barrier for exploitation once the network position is achieved. Overall, the vulnerability could lead to significant operational disruption, data breaches, and erosion of trust in automated workflows if exploited.
Mitigation Recommendations
1. Upgrade n8n to version 2.5.0 or later immediately, as this version includes the fix that enforces SSH host key verification for Source Control git operations. 2. If upgrading is not immediately feasible, disable the Source Control feature entirely if it is not actively required to eliminate the attack surface. 3. Restrict network access so that the n8n instance communicates with the Git server only over trusted, controlled network paths such as VPNs or private networks, minimizing the risk of man-in-the-middle attacks. 4. Implement network monitoring and intrusion detection systems to detect unusual SSH or git traffic patterns that may indicate interception attempts. 5. Regularly audit and verify the integrity of workflows and repository contents to detect unauthorized changes promptly. 6. Educate administrators about the risks of disabling SSH host key verification and encourage strict adherence to secure SSH practices in all automated processes. 7. Consider deploying SSH bastion hosts or jump servers that enforce strict host key verification policies as intermediaries for git operations. These steps collectively reduce the risk of exploitation and help maintain the integrity and confidentiality of automated workflows.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, India
CVE-2026-33724: CWE-639: Authorization Bypass Through User-Controlled Key in n8n-io n8n
Description
n8n is an open source workflow automation platform. Prior to version 2.5.0, when the Source Control feature is configured to use SSH, the SSH command used for git operations explicitly disabled host key verification. A network attacker positioned between the n8n instance and the remote Git server could intercept the connection and present a fraudulent host key, potentially injecting malicious content into workflows or intercepting repository data. This issue only affects instances where the Source Control feature has been explicitly enabled and configured to use SSH (non-default). The issue has been fixed in n8n version 2.5.0. Users should upgrade to this version or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Disable the Source Control feature if it is not actively required, and/or restrict network access to ensure the n8n instance communicates with the Git server only over trusted, controlled network paths. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability CVE-2026-33724 affects n8n, an open-source workflow automation platform, specifically versions prior to 2.5.0 when the Source Control feature is enabled and configured to use SSH for git operations. In these versions, the SSH command explicitly disables host key verification, a critical security step that ensures the authenticity of the remote Git server. Without host key verification, a network attacker positioned between the n8n instance and the Git server can perform a man-in-the-middle (MITM) attack by presenting a fraudulent SSH host key. This enables the attacker to intercept or manipulate the git communication channel. Potential impacts include injecting malicious code or workflows into the repository, which could then be executed by the n8n platform, or exfiltrating sensitive repository data. The vulnerability is classified under CWE-639 (Authorization Bypass Through User-Controlled Key), highlighting the risk of unauthorized access due to improper validation of SSH keys. Exploitation does not require authentication or user interaction but does require the Source Control feature to be explicitly enabled and configured to use SSH, which is not the default setting. The issue was publicly disclosed on March 25, 2026, and fixed in n8n version 2.5.0. Until upgrading, recommended mitigations include disabling the Source Control feature if not needed and restricting network access to ensure communication with the Git server occurs only over trusted and controlled network paths. These mitigations reduce but do not eliminate the risk. No known exploits are reported in the wild as of the publication date. The CVSS v4.0 base score is 6.3, reflecting a medium severity with network attack vector, high attack complexity, and partial impact on confidentiality and integrity.
Potential Impact
This vulnerability poses a significant risk to organizations using n8n with the Source Control feature enabled over SSH. Successful exploitation allows an attacker to perform man-in-the-middle attacks, potentially injecting malicious workflows that could execute arbitrary actions within the automation platform. This can lead to unauthorized data access, manipulation of automated processes, and potential lateral movement within the network. Confidentiality is impacted by possible interception of repository data, and integrity is compromised by unauthorized code injection. Availability is less directly affected but could be impacted if malicious workflows disrupt normal operations. Organizations relying on automated workflows for critical business processes or sensitive data handling are at higher risk. The attack requires network positioning capabilities, which may limit exposure to attackers with internal network access or those able to intercept traffic on public or poorly secured networks. However, the lack of authentication or user interaction requirements lowers the barrier for exploitation once the network position is achieved. Overall, the vulnerability could lead to significant operational disruption, data breaches, and erosion of trust in automated workflows if exploited.
Mitigation Recommendations
1. Upgrade n8n to version 2.5.0 or later immediately, as this version includes the fix that enforces SSH host key verification for Source Control git operations. 2. If upgrading is not immediately feasible, disable the Source Control feature entirely if it is not actively required to eliminate the attack surface. 3. Restrict network access so that the n8n instance communicates with the Git server only over trusted, controlled network paths such as VPNs or private networks, minimizing the risk of man-in-the-middle attacks. 4. Implement network monitoring and intrusion detection systems to detect unusual SSH or git traffic patterns that may indicate interception attempts. 5. Regularly audit and verify the integrity of workflows and repository contents to detect unauthorized changes promptly. 6. Educate administrators about the risks of disabling SSH host key verification and encourage strict adherence to secure SSH practices in all automated processes. 7. Consider deploying SSH bastion hosts or jump servers that enforce strict host key verification policies as intermediaries for git operations. These steps collectively reduce the risk of exploitation and help maintain the integrity and confidentiality of automated workflows.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-23T17:34:57.559Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 69c42db5f4197a8e3b77dc26
Added to database: 3/25/2026, 6:47:17 PM
Last enriched: 3/25/2026, 7:01:12 PM
Last updated: 3/26/2026, 5:28:27 AM
Views: 13
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.