Authorization Bypass Through User-Controlled Key Affecting n8n-nodes-base package, versions <1.121.19>=2.13.0 <2.13.1>=2.14.0 <2.14.1


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.02% (5th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Authorization Bypass Through User-Controlled Key vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-N8NNODESBASE-15834790
  • published31 Mar 2026
  • disclosed25 Mar 2026
  • creditJinho Ju

Introduced: 25 Mar 2026

NewCVE-2026-33663  (opens in a new tab)
CWE-639  (opens in a new tab)

How to fix?

Upgrade n8n-nodes-base to version 1.121.19, 2.13.1, 2.14.1 or higher.

Overview

n8n-nodes-base is a Base nodes of n8n

Affected versions of this package are vulnerable to Authorization Bypass Through User-Controlled Key via the credential resolution and permission check. An attacker can access and decrypt plaintext secrets belonging to other users by exploiting chained authorization flaws that bypass ownership and project scope checks.

Note: This is only exploitable if the instance is running the Community Edition and the attacker has the global:member role.

CVSS Base Scores

version 4.0
version 3.1