Plattform
nodejs
Komponente
n8n
Behoben in
1.123.27
2.0.1
2.14.1
1.123.26
CVE-2026-33713 describes a SQL Injection vulnerability discovered in n8n, a workflow automation platform. This vulnerability allows an authenticated user with workflow creation/modification permissions to inject malicious SQL code. The impact is particularly severe on PostgreSQL deployments, where multi-statement execution is possible, enabling data modification and deletion. Affected versions include those prior to 1.123.26, 2.13.3, and 2.14.1; upgrading is the recommended remediation.
The SQL Injection vulnerability in n8n's Data Table Get node allows an attacker to inject arbitrary SQL code into database queries. On SQLite databases, the impact is limited to single-statement manipulation. However, on PostgreSQL databases, the vulnerability enables multi-statement execution, significantly expanding the attack surface. This could allow an attacker to read, modify, or delete sensitive data stored within the n8n database, including user credentials, workflow configurations, and execution history. Successful exploitation could lead to complete data compromise and disruption of automated workflows, potentially impacting business processes reliant on n8n.
CVE-2026-33713 was publicly disclosed on 2026-03-26. The vulnerability's severity is rated as CRITICAL (CVSS 9.9). Currently, there are no publicly available exploits or reports of active exploitation. It is not listed on the CISA KEV catalog at the time of writing. The relatively recent disclosure suggests that attackers may be actively researching this vulnerability, making proactive mitigation essential.
Organizations utilizing n8n for workflow automation, particularly those running PostgreSQL databases, are at risk. This includes businesses relying on n8n for data integration, process automation, and API management. Environments with less stringent user permission controls are also at higher risk, as the vulnerability requires only authenticated user access to create or modify workflows.
• nodejs / server:
grep -r "Data Table Get node" /opt/n8n/resources/app/nodes/• linux / server:
journalctl -u n8n -f | grep "SQL injection"• database (postgresql):
SELECT query FROM audit_log WHERE query LIKE '%DROP TABLE%';disclosure
Exploit-Status
EPSS
0.02% (4% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation for CVE-2026-33713 is to upgrade n8n to version 1.123.26 or later, or to version 2.13.3 or 2.14.1. If immediate upgrading is not possible, consider restricting user permissions to limit the ability to create or modify workflows. While not a complete fix, implementing strict input validation and sanitization within the Data Table Get node can help reduce the risk of successful SQL injection. Regularly review and audit workflow configurations for suspicious activity. After upgrading, confirm the vulnerability is resolved by attempting a SQL injection payload within a workflow and verifying that it is properly sanitized.
Aktualisieren Sie n8n auf Version 1.123.26, 2.13.3, 2.14.1 oder höher. Wenn ein Update nicht sofort möglich ist, beschränken Sie die Berechtigungen zum Erstellen und Bearbeiten von Workflows auf vertrauenswürdige Benutzer, deaktivieren Sie den Data Table Node, indem Sie `n8n-nodes-base.dataTable` zur Umgebungsvariablen `NODES_EXCLUDE` hinzufügen, und/oder überprüfen Sie bestehende Workflows auf Data Table Get Nodes, bei denen `orderByColumn` mit einem Ausdruck konfiguriert ist, der externe oder benutzerdefinierte Eingaben enthält.
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-33713 is a critical SQL Injection vulnerability affecting n8n versions before 1.123.26, 2.13.3, and 2.14.1. It allows authenticated users to inject malicious SQL code, potentially leading to data compromise.
If you are running n8n versions prior to 1.123.26, 2.13.3, or 2.14.1, you are vulnerable. PostgreSQL deployments are at higher risk.
Upgrade n8n to version 1.123.26 or later, or to version 2.13.3 or 2.14.1. Restrict user permissions as a temporary workaround.
While no public exploits are currently known, the vulnerability's severity and ease of exploitation suggest a potential for active exploitation.
Refer to the n8n security advisories page for the latest information: [https://n8n.io/security](https://n8n.io/security)
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.