1.115.2
6 years ago
3 days ago
Known vulnerabilities in the n8n package. This does not include vulnerabilities belonging to this package’s dependencies.
Automatically find and fix vulnerabilities affecting your projects. Snyk scans for vulnerabilities and provides fixes for free.
Fix for freeVulnerability | Vulnerable Version |
---|---|
n8n is a n8n Workflow Automation Tool Affected versions of this package are vulnerable to Command Injection via the Note: This is only exploitable if the This issue does not impact As per maintainers' memo: "No code changes have been made to alter the behavior of the Execute Command node. The recommended mitigation is to disable the node by default in environments where it is not explicitly required. Future n8n versions may change the default availability of this node." ##Workaround This vulnerability can be mitigated by disabling the How to fix Command Injection? There is no fixed version for | >=0.0.1 |
n8n is a n8n Workflow Automation Tool Affected versions of this package are vulnerable to Missing Authorization over the How to fix Missing Authorization? Upgrade | <1.99.1 |
n8n is a n8n Workflow Automation Tool Affected versions of this package are vulnerable to Uncaught Exception via the How to fix Uncaught Exception? Upgrade | <1.99.0 |
n8n is a n8n Workflow Automation Tool Affected versions of this package are vulnerable to Cross-site Scripting (XSS) via a lack of MIME type validation on uploaded binary files, which can be controlled through a GET parameter. This allows an authenticated attacker with member-level privileges to upload a crafted HTML file containing malicious code. If another authenticated user visits the binary data endpoint with the MIME type specified as How to fix Cross-site Scripting (XSS)? Upgrade | <1.90.0 |