SQL Injection Affecting n8n-nodes-base package, versions <1.121.23>=2.0.0-rc.0 <2.17.2>=2.18.0 <2.18.1


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (9th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about SQL Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JS-N8NNODESBASE-16353561
  • published3 May 2026
  • disclosed29 Apr 2026
  • creditUnknown

Introduced: 29 Apr 2026

NewCVE-2026-42237  (opens in a new tab)
CWE-89  (opens in a new tab)

How to fix?

Upgrade n8n-nodes-base to version 1.121.23, 2.17.2, 2.18.1 or higher.

Overview

n8n-nodes-base is a Base nodes of n8n

Affected versions of this package are vulnerable to SQL Injection via the process of constructing SQL queries in the Snowflake and legacy MySQL v1 nodes when user-controlled input is directly interpolated into identifier fields such as table name, column name, or update key without proper escaping. An attacker can exfiltrate, modify, or delete data on the connected database by supplying crafted input through workflow expressions.

Workaround

This vulnerability can be mitigated by limiting workflow creation and editing permissions to fully trusted users, migrating workflows from the legacy MySQL v1 node to the MySQL v2 node, disabling the Snowflake node by adding n8n-nodes-base.snowflake to the NODES_EXCLUDE environment variable, and avoiding the use of unvalidated external input in table name, column name, or update key fields in the affected nodes.

CVSS Base Scores

version 4.0
version 3.1