CVE-2026-33713

GHSA-98c2-4cr3-4jc3 HIGH

n8n: SQLi in Data Table node, full DB compromise

Published March 25, 2026
CISO Take

Any authenticated n8n user with workflow edit rights can exploit this SQL injection to exfiltrate, modify, or delete your entire database on PostgreSQL deployments. Patch to 1.123.26/2.13.3/2.14.1 immediately; if n8n is used as an AI automation backbone, assume blast radius extends to all downstream data connected via workflows. EPSS is still low but the attack requires only low privileges and no user interaction.

Affected Systems

Package Ecosystem Vulnerable Range Patched
n8n npm < 1.123.26 1.123.26

Do you use n8n? You're affected.

Severity & Risk

CVSS 3.1
8.8 / 10
EPSS
0.0%
chance of exploitation in 30 days
KEV Status
Not in KEV
Sophistication
Trivial

Recommended Action

  1. 1. PATCH: Upgrade to n8n 1.123.26 (v1 branch), 2.13.3, or 2.14.1 immediately. 2. RESTRICT permissions: Limit workflow creation/editing to fully trusted users only via n8n's role system. 3. DISABLE the node if unused: Set NODES_EXCLUDE=n8n-nodes-base.dataTable in environment variables. 4. AUDIT: Search existing workflows for Data Table Get nodes where orderByColumn is set to an expression—flag any using $json, $input, or user-supplied variables. 5. DETECT: Monitor PostgreSQL query logs for unusual multi-statement patterns originating from n8n service account. 6. ISOLATE: Ensure n8n's DB service account follows least-privilege—no DROP, TRUNCATE, or cross-schema access.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Art.15 - Accuracy, robustness and cybersecurity
ISO 42001
A.6.2.6 - AI System Input Controls A.9.4 - AI System Security
NIST AI RMF
MANAGE 2.2 - Mechanisms to sustain effectiveness of risk controls
OWASP LLM Top 10
LLM07:2023 - Insecure Plugin Design

Technical Details

NVD Description

n8n is an open source workflow automation platform. Prior to versions 2.14.1, 2.13.3, and 1.123.26, an authenticated user with permission to create or modify workflows could exploit a SQL injection vulnerability in the Data Table Get node. On default SQLite DB, single statements can be manipulated and the attack surface is practically limited. On PostgreSQL deployments, multi-statement execution is possible, enabling data modification and deletion. The issue has been fixed in n8n versions 1.123.26, 2.13.3, and 2.14.1. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations: Limit workflow creation and editing permissions to fully trusted users only, disable the Data Table node by adding `n8n-nodes-base.dataTable` to the `NODES_EXCLUDE` environment variable, and/or review existing workflows for Data Table Get nodes where `orderByColumn` is set to an expression that incorporates external or user-supplied input. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.

Exploitation Scenario

An attacker with a legitimate n8n account (e.g., a contractor, compromised internal credential, or over-privileged developer) creates or modifies a workflow containing a Data Table Get node. They set the orderByColumn parameter to an expression that injects SQL: e.g., id; DROP TABLE ai_training_data; -- or a UNION-based payload to extract API keys from n8n's own credentials table. On a PostgreSQL backend, the injected multi-statement payload executes directly, allowing the attacker to exfiltrate LLM API keys, Stripe webhooks, or database credentials stored in n8n's encrypted credential store—then pivot to connected AI infrastructure. The attack leaves minimal trace if audit logging is not enabled on the DB layer.

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Timeline

Published
March 25, 2026
Last Modified
March 27, 2026
First Seen
March 25, 2026