In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applicationsLearn about Authorization Bypass Through User-Controlled Key vulnerabilities in an interactive lesson.
Start learningUpgrade n8n to version 1.123.43, 2.20.7-exp.0, 2.21.1 or higher.
n8n is a n8n Workflow Automation Tool
Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key via the OAuth1 and OAuth2 credential reconnect endpoints. A user with readonly access to shared credentials can overwrite stored OAuth token material for the shared credentials by initiating a reconnect flow with an external account they control, causing workflows to execute under the attacker's OAuth identity and enabling data exfiltration to attacker-controlled external services and persistent takeover of shared integrations.