UNKNOWNCVE-2026-33713

n8n has SQL Injection in Data Table Node via orderByColumn Expression

Platform

nodejs

Component

n8n

Fixed in

1.123.26

## Impact An authenticated user with permission to create or modify workflows could exploit a SQL injection vulnerability in the Data Table Get node. On default SQLite DB, single statements can be manipulated and the attack surface is practically limited. On PostgreSQL deployments, multi-statement execution is possible, enabling data modification and deletion. ## Patches The issue has been fixed in n8n versions 1.123.26, 2.13.3, and 2.14.1. Users should upgrade to one of these versions or later to remediate the vulnerability. ## Workarounds If upgrading is not immediately possible, administrators should consider the following temporary mitigations: - Limit workflow creation and editing permissions to fully trusted users only. - Disable the Data Table node by adding `n8n-nodes-base.dataTable` to the `NODES_EXCLUDE` environment variable. - Review existing workflows for Data Table Get nodes where `orderByColumn` is set to an expression that incorporates external or user-supplied input. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.

How to fix

Actualice n8n a la versión 1.123.26, 2.13.3, 2.14.1 o superior. Si la actualización no es posible de inmediato, limite los permisos de creación y edición de flujos de trabajo a usuarios de confianza, deshabilite el nodo Data Table agregando `n8n-nodes-base.dataTable` a la variable de entorno `NODES_EXCLUDE`, y/o revise los flujos de trabajo existentes para nodos Data Table Get donde `orderByColumn` esté configurado con una expresión que incorpore entrada externa o proporcionada por el usuario.

Monitor your dependencies automatically

Get notified when new vulnerabilities affect your projects. Free forever.

Start free