CVE-2026-27578

5.4 MEDIUM

📋 TL;DR

This CVE describes a cross-site scripting (XSS) vulnerability in n8n workflow automation platform where authenticated users with workflow creation/modification permissions can inject malicious scripts into pages rendered by the application. The injected scripts execute in the browser of any user visiting affected pages, enabling session hijacking and account takeover. This affects all n8n instances running vulnerable versions.

💻 Affected Systems

Products:
  • n8n
Versions: All versions prior to 2.10.1, 2.9.3, and 1.123.22
Operating Systems: All platforms running n8n
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with workflow creation/modification permissions. Affects multiple node types: Form Trigger, Chat Trigger, Send & Wait, Webhook, and Chat nodes.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete account takeover of any user visiting maliciously crafted pages, leading to data theft, privilege escalation, and full compromise of the n8n instance.

🟠

Likely Case

Session hijacking of users who interact with workflows containing malicious scripts, potentially leading to unauthorized access to sensitive workflow data and automation capabilities.

🟢

If Mitigated

Limited impact if only trusted administrators have workflow creation permissions and proper input validation is enforced.

🌐 Internet-Facing: HIGH - If n8n is exposed to the internet, attackers could exploit this to compromise user sessions and gain unauthorized access.
🏢 Internal Only: MEDIUM - Internal attackers with workflow permissions could still exploit this, but attack surface is reduced compared to internet-facing deployments.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access with workflow permissions. The vulnerability is well-documented in the security advisory with specific node types identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.10.1, 2.9.3, or 1.123.22

Vendor Advisory: https://github.com/n8n-io/n8n/security/advisories/GHSA-2p9h-rqjw-gm92

Restart Required: Yes

Instructions:

1. Backup your n8n instance and workflows. 2. Stop the n8n service. 3. Update n8n to version 2.10.1, 2.9.3, or 1.123.22 using your package manager or deployment method. 4. Restart the n8n service. 5. Verify the update was successful.

🔧 Temporary Workarounds

Restrict workflow permissions

all

Limit workflow creation and editing permissions to fully trusted users only

Disable Webhook node

linux

Add webhook node to excluded nodes list to disable one of the vulnerable components

export NODES_EXCLUDE="n8n-nodes-base.webhook"

🧯 If You Can't Patch

  • Implement strict access controls limiting workflow creation/modification to minimal trusted users
  • Monitor workflow changes and audit all existing workflows for suspicious script content

🔍 How to Verify

Check if Vulnerable:

Check n8n version via web interface or API. If version is below 2.10.1, 2.9.3, or 1.123.22, the system is vulnerable.

Check Version:

curl -X GET http://localhost:5678/rest/health or check n8n web interface settings

Verify Fix Applied:

After updating, verify version is 2.10.1, 2.9.3, or 1.123.22 or higher. Test workflow creation with script injection attempts to confirm they are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual workflow modifications
  • Multiple failed script execution attempts
  • Suspicious node configurations in workflow logs

Network Indicators:

  • Unexpected JavaScript payloads in workflow data
  • Suspicious script tags in form/chat submissions

SIEM Query:

source="n8n" AND ("workflow modified" OR "script" OR "inject")

🔗 References

📤 Share & Export