7.3

CVSS4.0

CVE-2026-33722 - n8n Has External Secrets Authorization Bypass in Credential Saving

n8n is an open source workflow automation platform. Prior to versions 2.6.4 and 1.123.23, an authenticated user without permission to list external secrets could reference a secret by the external name in a credential and retrieve its plaintext value when saving the credential. This bypassed the `e…

πŸ“… Published: March 25, 2026, 6:09 p.m. πŸ”„ Last Modified: March 29, 2026, 8:28 p.m.

6.3

CVSS4.0

CVE-2026-33720 - n8n Has Authorization Bypass in OAuth Callback via N8N_SKIP_AUTH_ON_OAUTH_CALLBACK

n8n is an open source workflow automation platform. Prior to version 2.8.0, when the `N8N_SKIP_AUTH_ON_OAUTH_CALLBACK` environment variable is set to `true`, the OAuth callback handler skips ownership verification of the OAuth state parameter. This allows an attacker to trick a victim into completi…

πŸ“… Published: March 25, 2026, 6:06 p.m. πŸ”„ Last Modified: March 29, 2026, 8:28 p.m.

8.7

CVSS4.0

CVE-2026-33713 - n8n Vulnerable to SQL Injection in Data Table Node via orderByColumn Expression

n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.13.3, and 1.123.26, an authenticated user with permission to create or modify workflows could exploit a SQL injection vulnerability in the Data Table Get node. On default SQLite DB, single statements can be manipulated …

πŸ“… Published: March 25, 2026, 5:47 p.m. πŸ”„ Last Modified: March 29, 2026, 8:28 p.m.

9.4

CVSS4.0

CVE-2026-33696 - n8n Vulnerable to Prototype Pollution in XML & GSuiteAdmin node parameters lead to RCE

n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.13.3, and 1.123.27, an authenticated user with permission to create or modify workflows could exploit a prototype pollution vulnerability in the XML and the GSuiteAdmin nodes. By supplying a crafted parameters as part o…

πŸ“… Published: March 25, 2026, 5:40 p.m. πŸ”„ Last Modified: March 29, 2026, 8:28 p.m.

8.8

CVSS4.0

CVE-2026-33665 - n8n: LDAP Email-Based Account Linking Allows Privilege Escalation and Account Takeover

n8n is an open source workflow automation platform. Prior to versions 2.4.0 and 1.121.0, when LDAP authentication is enabled, n8n automatically linked an LDAP identity to an existing local account if the LDAP email attribute matched the local account's email. An authenticated LDAP user who could co…

πŸ“… Published: March 25, 2026, 5:32 p.m. πŸ”„ Last Modified: March 30, 2026, 8:57 p.m.

8.5

CVSS4.0

CVE-2026-33663 - n8n Vulnerable to Credential Theft via Name-Based Resolution and Permission Checker Bypass in Commu…

n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.13.3, and 1.123.27, an authenticated user with the `global:member` role could exploit chained authorization flaws in n8n's credential pipeline to steal plaintext secrets from generic HTTP credentials (`httpBasicAuth`, `…

πŸ“… Published: March 25, 2026, 5:11 p.m. πŸ”„ Last Modified: March 31, 2026, 8:09 p.m.

9.4

CVSS4.0

CVE-2026-33660 - n8n Has Multiple Remote Code Execution Vulnerabilities in Merge Node AlaSQL SQL Mode

n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.13.3, and 1.123.26, an authenticated user with permission to create or modify workflows could use the Merge node's "Combine by SQL" mode to read local files on the n8n host and achieve remote code execution. The AlaSQL …

πŸ“… Published: March 25, 2026, 5:09 p.m. πŸ”„ Last Modified: March 30, 2026, 8:57 p.m.

7.1

CVSS4.0

CVE-2026-27496 - n8n has In-Process Memory Disclosure in its Task Runner

n8n is an open source workflow automation platform. Prior to versions 1.123.22, 2.9.3, and 2.10.1, an authenticated user with permission to create or modify workflows could use the JavaScript Task Runner to allocate uninitialized memory buffers. Uninitialized buffers may contain residual data from …

πŸ“… Published: March 25, 2026, 5:07 p.m. πŸ”„ Last Modified: March 29, 2026, 8:28 p.m.

5.6

CVSS4.0

CVE-2026-2414 -

Authorization bypass through User-Controlled key vulnerability in HYPR Server allows Privilege Escalation.This issue affects Server: from 9.5.2 before 10.7.2.

πŸ“… Published: March 25, 2026, 5:03 p.m. πŸ”„ Last Modified: April 2, 2026, 7:59 a.m.

4.4

CVSS3.1

CVE-2026-25645 - Requests has Insecure Temp File Reuse in its extract_zipped_paths() utility function

Requests is a HTTP library. Prior to version 2.33.0, the `requests.utils.extract_zipped_paths()` utility function uses a predictable filename when extracting files from zip archives into the system temporary directory. If the target file already exists, it is reused without validation. A local atta…

πŸ“… Published: March 25, 2026, 5:02 p.m. πŸ”„ Last Modified: March 30, 2026, 8:57 p.m.
Total resulsts: 349182
Page 878 of 34,919
Β« previous page Β» next page
Filters