CVE-2023-27563: n8n: privilege escalation exposes full workflow admin
HIGH PoC AVAILABLE CISA: ATTENDAny authenticated n8n user — including low-privilege API tokens or shared team accounts — can escalate to full admin in v0.218.0, with a published exploit available. Since n8n routinely stores API keys for OpenAI, AWS, and internal services, a single compromised low-privilege account translates directly into credential exfiltration across every connected service. Patch immediately and rotate all credentials stored in n8n as potentially compromised.
Risk Assessment
HIGH risk with immediate operational exposure. CVSS 8.8 reflects a near-trivial exploitation path: network-accessible, low complexity, requires only a basic account. The Synacktiv advisory confirms a working exploit exists. n8n is widely deployed as the orchestration layer for AI automation pipelines, often holding privileged access to LLM APIs, cloud credentials, and internal data sources. The combination of low-barrier escalation and high-value credential stores makes this a priority target for opportunistic threat actors targeting AI infrastructure.
Affected Systems
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| n8n | npm | — | No patch |
Do you use n8n? You're affected.
Severity & Risk
Attack Surface
Recommended Action
5 steps-
PATCH IMMEDIATELY
Upgrade n8n to the latest version (review github.com/n8n-io/n8n/releases for patched release).
-
ROTATE ALL CREDENTIALS
Treat every credential stored in n8n — AI API keys, DB passwords, cloud tokens, webhook secrets — as compromised, regardless of evidence of exploitation.
-
AUDIT ACCESS LOGS
Review n8n activity logs for unexpected admin-level actions performed by non-admin accounts; flag any credential exports or workflow modifications.
-
ISOLATE IF UNPATCHED
If immediate patching is not possible, restrict n8n to an IP allowlist, revoke all non-essential accounts, and disable public registration.
-
DETECT POST-EXPLOITATION: Alert on admin role changes, new credential creation, or new workflow triggers not matching approved baselines.
CISA SSVC Assessment
Source: CISA Vulnrichment (SSVC v2.0). Decision based on the CISA Coordinator decision tree.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2023-27563?
Any authenticated n8n user — including low-privilege API tokens or shared team accounts — can escalate to full admin in v0.218.0, with a published exploit available. Since n8n routinely stores API keys for OpenAI, AWS, and internal services, a single compromised low-privilege account translates directly into credential exfiltration across every connected service. Patch immediately and rotate all credentials stored in n8n as potentially compromised.
Is CVE-2023-27563 actively exploited?
Proof-of-concept exploit code is publicly available for CVE-2023-27563, increasing the risk of exploitation.
How to fix CVE-2023-27563?
1. PATCH IMMEDIATELY: Upgrade n8n to the latest version (review github.com/n8n-io/n8n/releases for patched release). 2. ROTATE ALL CREDENTIALS: Treat every credential stored in n8n — AI API keys, DB passwords, cloud tokens, webhook secrets — as compromised, regardless of evidence of exploitation. 3. AUDIT ACCESS LOGS: Review n8n activity logs for unexpected admin-level actions performed by non-admin accounts; flag any credential exports or workflow modifications. 4. ISOLATE IF UNPATCHED: If immediate patching is not possible, restrict n8n to an IP allowlist, revoke all non-essential accounts, and disable public registration. 5. DETECT POST-EXPLOITATION: Alert on admin role changes, new credential creation, or new workflow triggers not matching approved baselines.
What systems are affected by CVE-2023-27563?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, AI workflow automation, RAG pipelines, model serving.
What is the CVSS score for CVE-2023-27563?
CVE-2023-27563 has a CVSS v3.1 base score of 8.8 (HIGH). The EPSS exploitation probability is 0.33%.
Technical Details
NVD Description
The n8n package 0.218.0 for Node.js allows Escalation of Privileges.
Exploitation Scenario
An attacker registers or obtains any valid n8n account — through credential stuffing on a public-facing instance, a compromised contractor token, or social engineering a team member. Using crafted API requests described in the Synacktiv advisory, they escalate their session to admin privileges. As admin, they navigate to the Credentials vault and extract all stored API keys for OpenAI, AWS, internal databases, and webhook endpoints. They then silently modify an existing AI workflow — for example, a document summarization pipeline feeding an LLM — to forward all processed documents to an attacker-controlled endpoint. The attack leaves no obvious user-facing indicators and can persist indefinitely until the workflow is manually reviewed.
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H References
Timeline
Related Vulnerabilities
CVE-2026-33663 10.0 n8n: member role steals plaintext HTTP credentials
Same package: n8n CVE-2026-33660 10.0 TensorFlow: type confusion NPD in tensor conversion
Same package: n8n CVE-2026-21858 10.0 n8n: Input Validation flaw enables exploitation
Same package: n8n CVE-2026-27577 9.9 n8n: Code Injection enables RCE
Same package: n8n CVE-2026-27494 9.9 n8n: security flaw enables exploitation
Same package: n8n
AI Threat Alert