Skip to content

Commit 48384e2

Browse files
1 parent a93041e commit 48384e2

3 files changed

Lines changed: 246 additions & 0 deletions

File tree

Lines changed: 68 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,68 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-fvfv-ppw4-7h2w",
4+
"modified": "2026-02-26T22:46:43Z",
5+
"published": "2026-02-26T22:46:42Z",
6+
"aliases": [],
7+
"summary": "n8n has a Guardrail Node Bypass",
8+
"details": "## Impact\nAn end user interacting with a workflow that uses the Guardrail node could craft an input that bypasses the default guardrail instructions.\n\n## Patches\nThe issue has been fixed in n8n version 2.10.0. Users should upgrade to this version or later to remediate the vulnerability.\n\n## Workarounds\nIf upgrading is not immediately possible, administrators should consider the following temporary mitigations:\n- Limit access to trusted users.\n- Review asses the practical impact of guardrail bypasses in your usecase and adjust your workflow accordingly.\n\nThese workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.",
9+
"severity": [
10+
{
11+
"type": "CVSS_V3",
12+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N"
13+
},
14+
{
15+
"type": "CVSS_V4",
16+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N"
17+
}
18+
],
19+
"affected": [
20+
{
21+
"package": {
22+
"ecosystem": "npm",
23+
"name": "n8n"
24+
},
25+
"ranges": [
26+
{
27+
"type": "ECOSYSTEM",
28+
"events": [
29+
{
30+
"introduced": "0"
31+
},
32+
{
33+
"fixed": "2.10.0"
34+
}
35+
]
36+
}
37+
]
38+
}
39+
],
40+
"references": [
41+
{
42+
"type": "WEB",
43+
"url": "https://github.com/n8n-io/n8n/security/advisories/GHSA-fvfv-ppw4-7h2w"
44+
},
45+
{
46+
"type": "WEB",
47+
"url": "https://github.com/n8n-io/n8n/commit/8d0251d1deef256fd3d9176f05dedab62afde918"
48+
},
49+
{
50+
"type": "PACKAGE",
51+
"url": "https://github.com/n8n-io/n8n"
52+
},
53+
{
54+
"type": "WEB",
55+
"url": "https://github.com/n8n-io/n8n/releases/tag/n8n@2.10.0"
56+
}
57+
],
58+
"database_specific": {
59+
"cwe_ids": [
60+
"CWE-20",
61+
"CWE-693"
62+
],
63+
"severity": "MODERATE",
64+
"github_reviewed": true,
65+
"github_reviewed_at": "2026-02-26T22:46:42Z",
66+
"nvd_published_at": null
67+
}
68+
}
Lines changed: 109 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,109 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-jh8h-6c9q-7gmw",
4+
"modified": "2026-02-26T22:45:41Z",
5+
"published": "2026-02-26T22:45:41Z",
6+
"aliases": [],
7+
"summary": "n8n has an Authentication Bypass in its Chat Trigger Node",
8+
"details": "## Impact\nWhen the Chat Trigger node is configured with n8n User Auth authentication, the authentication check could be circumvented. \n- This issue requires the Chat Trigger node to be configured with n8n User Auth authentication (non-default).\n\n## Patches\nThe issue has been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to one of these versions or later to remediate the vulnerability.\n\n## Workarounds\nIf upgrading is not immediately possible, administrators should consider the following temporary mitigations:\n- Limit workflow creation and editing permissions to fully trusted users only.\n- Use a different authentication method for the Chat Trigger node, or restrict network access to the webhook endpoint to trusted origins.\n\nThese workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.",
9+
"severity": [
10+
{
11+
"type": "CVSS_V3",
12+
"score": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N"
13+
},
14+
{
15+
"type": "CVSS_V4",
16+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N"
17+
}
18+
],
19+
"affected": [
20+
{
21+
"package": {
22+
"ecosystem": "npm",
23+
"name": "n8n"
24+
},
25+
"ranges": [
26+
{
27+
"type": "ECOSYSTEM",
28+
"events": [
29+
{
30+
"introduced": "0"
31+
},
32+
{
33+
"fixed": "1.123.22"
34+
}
35+
]
36+
}
37+
]
38+
},
39+
{
40+
"package": {
41+
"ecosystem": "npm",
42+
"name": "n8n"
43+
},
44+
"ranges": [
45+
{
46+
"type": "ECOSYSTEM",
47+
"events": [
48+
{
49+
"introduced": "2.0.0"
50+
},
51+
{
52+
"fixed": "2.9.3"
53+
}
54+
]
55+
}
56+
]
57+
},
58+
{
59+
"package": {
60+
"ecosystem": "npm",
61+
"name": "n8n"
62+
},
63+
"ranges": [
64+
{
65+
"type": "ECOSYSTEM",
66+
"events": [
67+
{
68+
"introduced": "2.10.0"
69+
},
70+
{
71+
"fixed": "2.10.1"
72+
}
73+
]
74+
}
75+
]
76+
}
77+
],
78+
"references": [
79+
{
80+
"type": "WEB",
81+
"url": "https://github.com/n8n-io/n8n/security/advisories/GHSA-jh8h-6c9q-7gmw"
82+
},
83+
{
84+
"type": "WEB",
85+
"url": "https://github.com/n8n-io/n8n/commit/062644ef786b6af480afe4a0f12bc6d70040534a"
86+
},
87+
{
88+
"type": "WEB",
89+
"url": "https://github.com/n8n-io/n8n/commit/1479aab2d32fe0ee087f82b9038b1035c98be2f6"
90+
},
91+
{
92+
"type": "WEB",
93+
"url": "https://github.com/n8n-io/n8n/commit/9e5212ecbc5d2d4e6f340b636a5e84be6369882e"
94+
},
95+
{
96+
"type": "PACKAGE",
97+
"url": "https://github.com/n8n-io/n8n"
98+
}
99+
],
100+
"database_specific": {
101+
"cwe_ids": [
102+
"CWE-287"
103+
],
104+
"severity": "MODERATE",
105+
"github_reviewed": true,
106+
"github_reviewed_at": "2026-02-26T22:45:41Z",
107+
"nvd_published_at": null
108+
}
109+
}
Lines changed: 69 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,69 @@
1+
{
2+
"schema_version": "1.4.0",
3+
"id": "GHSA-vjf3-2gpj-233v",
4+
"modified": "2026-02-26T22:45:14Z",
5+
"published": "2026-02-26T22:45:13Z",
6+
"aliases": [],
7+
"summary": "n8n has an SSO Enforcement Bypass in its Self-Service Settings API",
8+
"details": "## Impact\nAn authenticated user signed in through Single Sign-On (SSO) could disable SSO enforcement for their own account through the n8n API. This allowed the user to create a local password and authenticate directly with email and password, completely bypassing the organization's SSO policy, centralized identity management, and any identity-provider-enforced multi-factor authentication.\n\n## Patches\nThe issue has been fixed in n8n version 2.8.0. Users should upgrade to this version or later to remediate the vulnerability.\n\n## Workarounds\nIf upgrading is not immediately possible, administrators should consider the following temporary mitigations:\n- Monitor audit logs for users who create local credentials after authenticating via SSO.\n- Restrict the n8n instance to fully trusted users only.\n\nThese workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.",
9+
"severity": [
10+
{
11+
"type": "CVSS_V3",
12+
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:H/A:N"
13+
},
14+
{
15+
"type": "CVSS_V4",
16+
"score": "CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N"
17+
}
18+
],
19+
"affected": [
20+
{
21+
"package": {
22+
"ecosystem": "npm",
23+
"name": "n8n"
24+
},
25+
"ranges": [
26+
{
27+
"type": "ECOSYSTEM",
28+
"events": [
29+
{
30+
"introduced": "0"
31+
},
32+
{
33+
"fixed": "2.8.0"
34+
}
35+
]
36+
}
37+
]
38+
}
39+
],
40+
"references": [
41+
{
42+
"type": "WEB",
43+
"url": "https://github.com/n8n-io/n8n/security/advisories/GHSA-vjf3-2gpj-233v"
44+
},
45+
{
46+
"type": "WEB",
47+
"url": "https://github.com/n8n-io/n8n/commit/a70b2ea379086da3de103bb84811e88cadf29976"
48+
},
49+
{
50+
"type": "PACKAGE",
51+
"url": "https://github.com/n8n-io/n8n"
52+
},
53+
{
54+
"type": "WEB",
55+
"url": "https://github.com/n8n-io/n8n/releases/tag/n8n@2.8.0"
56+
}
57+
],
58+
"database_specific": {
59+
"cwe_ids": [
60+
"CWE-269",
61+
"CWE-284",
62+
"CWE-287"
63+
],
64+
"severity": "MODERATE",
65+
"github_reviewed": true,
66+
"github_reviewed_at": "2026-02-26T22:45:13Z",
67+
"nvd_published_at": null
68+
}
69+
}

0 commit comments

Comments
 (0)