2.18.5
7 years ago
5 days ago
Known vulnerabilities in the n8n package. This does not include vulnerabilities belonging to this package’s dependencies.
Snyk's AI Trust Platform automatically finds the best upgrade path and integrates with your development workflows. Secure your code at zero cost.
Fix for free| Vulnerability | Vulnerable Version |
|---|---|
n8n is a n8n Workflow Automation Tool Affected versions of this package are vulnerable to Prototype Pollution via the How to fix Prototype Pollution? Upgrade | <1.123.32>=2.0.0-rc.0 <2.17.4>=2.18.0 <2.18.1 |
n8n is a n8n Workflow Automation Tool Affected versions of this package are vulnerable to Allocation of Resources Without Limits or Throttling via the MCP OAuth client registration process. An attacker can exhaust server memory resources and render the instance unavailable by sending large unauthenticated registration payloads to the endpoint, which accepts requests regardless of MCP access settings. How to fix Allocation of Resources Without Limits or Throttling? A fix was pushed into the | * |
n8n is a n8n Workflow Automation Tool Affected versions of this package are vulnerable to Missing Authorization via the Note: This is only exploitable if the Hosted Chat workflow is publicly exposed with authentication set to How to fix Missing Authorization? Upgrade | <1.123.32>=2.0.0-rc.0 <2.17.4>=2.18.0 <2.18.1 |
n8n is a n8n Workflow Automation Tool Affected versions of this package are vulnerable to Command Injection via the Note: This is only exploitable if the This issue does not impact As per maintainers' memo: "No code changes have been made to alter the behavior of the Execute Command node. The recommended mitigation is to disable the node by default in environments where it is not explicitly required. Future n8n versions may change the default availability of this node." ##Workaround This vulnerability can be mitigated by disabling the How to fix Command Injection? There is no fixed version for | >=0.0.1 |