n8n has SQL Injection in Data Table Node via orderByColumn Expression
Platform
nodejs
Component
n8n
Fixed in
1.123.26
## Impact An authenticated user with permission to create or modify workflows could exploit a SQL injection vulnerability in the Data Table Get node. On default SQLite DB, single statements can be manipulated and the attack surface is practically limited. On PostgreSQL deployments, multi-statement execution is possible, enabling data modification and deletion. ## Patches The issue has been fixed in n8n versions 1.123.26, 2.13.3, and 2.14.1. Users should upgrade to one of these versions or later to remediate the vulnerability. ## Workarounds If upgrading is not immediately possible, administrators should consider the following temporary mitigations: - Limit workflow creation and editing permissions to fully trusted users only. - Disable the Data Table node by adding `n8n-nodes-base.dataTable` to the `NODES_EXCLUDE` environment variable. - Review existing workflows for Data Table Get nodes where `orderByColumn` is set to an expression that incorporates external or user-supplied input. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
How to fix
Actualice n8n a la versión 1.123.26, 2.13.3, 2.14.1 o superior. Si la actualización no es posible de inmediato, limite los permisos de creación y edición de flujos de trabajo a usuarios de confianza, deshabilite el nodo Data Table agregando `n8n-nodes-base.dataTable` a la variable de entorno `NODES_EXCLUDE`, y/o revise los flujos de trabajo existentes para nodos Data Table Get donde `orderByColumn` esté configurado con una expresión que incorpore entrada externa o proporcionada por el usuario.
Monitor your dependencies automatically
Get notified when new vulnerabilities affect your projects. Free forever.
Start free