SQL Injection Affecting n8n package, versions <1.123.27>=2.0.0-rc.0 <2.13.3>=2.14.0 <2.14.1


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.01% (4th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about SQL Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-N8N-15842851
  • published31 Mar 2026
  • disclosed26 Mar 2026
  • creditAndrew Lacambra

Introduced: 26 Mar 2026

NewCVE-2026-33713  (opens in a new tab)
CWE-89  (opens in a new tab)

How to fix?

Upgrade n8n to version 1.123.27, 2.13.3, 2.14.1 or higher.

Overview

n8n is a n8n Workflow Automation Tool

Affected versions of this package are vulnerable to SQL Injection in the orderByColumn expression of the Data Table Get node. An attacker with permissions to create or modify workflows can execute arbitrary SQL commands by supplying crafted input, potentially leading to unauthorized data access, modification, or deletion.

Note: This is only exploitable if the Data Table node is enabled.

Workaround

This vulnerability can be mitigated by:

  1. Disabling the Data Table node by adding n8n-nodes-base.dataTable to the NODES_EXCLUDE environment variable

  2. Reviewing existing workflows for Data Table Get nodes where orderByColumn is set to an expression that incorporates external or user-supplied input.

CVSS Base Scores

version 4.0
version 3.1