A SQL injection vulnerability in n8n's Source Control feature lets an attacker with write access to the connected git repository compromise the internal PostgreSQL database the moment an administrator performs a Source Control Pull — no additional interaction required beyond that single admin action. N8n is widely deployed as an AI agent orchestration hub connecting LLMs, enterprise APIs, and credential stores, making its database a high-value lateral-movement target: a successful injection exposes all stored API keys, workflow configurations, and automation secrets including credentials to downstream AI services. The package carries 80 prior CVEs and an OpenSSF Scorecard of only 6.1/10, signaling systemic security debt; in collaborative AI workflow teams where git repository write access is routinely shared, the attack prerequisites are easier to satisfy than they appear at first glance. Upgrade to n8n 1.123.43, 2.20.7, or 2.21.1 immediately; if upgrade is blocked, disable the Source Control feature entirely and audit repository write permissions.
What is the risk?
Risk is HIGH in environments running n8n as an AI orchestration layer. The multi-condition exploit chain (PostgreSQL backend + Source Control enabled + attacker repo write access + admin Pull action) limits opportunistic exploitation but does not substantially reduce risk in real-world AI workflow teams where shared git repo access and routine admin Pulls are standard operating procedure. The package's history of 80 CVEs and OpenSSF score of 6.1/10 indicate a pattern of insufficient input validation. SQL injection against a workflow orchestrator's PostgreSQL backend is critical impact — full credential store exfiltration is achievable in a single exploitation cycle, with no public exploit or KEV listing currently moderating urgency.
Attack Kill Chain
What systems are affected?
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| n8n | npm | < 1.123.43 | 1.123.43 |
Do you use n8n? You're affected.
Severity & Risk
What should I do?
7 steps-
Upgrade to n8n 1.123.43, 2.20.7, or 2.21.1 — the only complete remediation.
-
If upgrade is not immediately possible, disable the Source Control feature in n8n instance settings.
-
Audit and tighten git repository write permissions — restrict to the absolute minimum set of trusted principals.
-
Rotate all credentials stored in n8n's credential vault as a precautionary measure, prioritizing LLM API keys and OAuth tokens.
-
Enable PostgreSQL query logging and review recent logs for anomalous SQL patterns (unexpected DDL/DML, UNION-based queries, stacked statements).
-
Review Source Control Pull history for unexpected file imports or unusual column naming patterns in Data Table JSON files.
-
Treat any n8n-connected git repository as a security boundary requiring the same controls as application code.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is CVE-2026-44792?
A SQL injection vulnerability in n8n's Source Control feature lets an attacker with write access to the connected git repository compromise the internal PostgreSQL database the moment an administrator performs a Source Control Pull — no additional interaction required beyond that single admin action. N8n is widely deployed as an AI agent orchestration hub connecting LLMs, enterprise APIs, and credential stores, making its database a high-value lateral-movement target: a successful injection exposes all stored API keys, workflow configurations, and automation secrets including credentials to downstream AI services. The package carries 80 prior CVEs and an OpenSSF Scorecard of only 6.1/10, signaling systemic security debt; in collaborative AI workflow teams where git repository write access is routinely shared, the attack prerequisites are easier to satisfy than they appear at first glance. Upgrade to n8n 1.123.43, 2.20.7, or 2.21.1 immediately; if upgrade is blocked, disable the Source Control feature entirely and audit repository write permissions.
Is CVE-2026-44792 actively exploited?
No confirmed active exploitation of CVE-2026-44792 has been reported, but organizations should still patch proactively.
How to fix CVE-2026-44792?
1. Upgrade to n8n 1.123.43, 2.20.7, or 2.21.1 — the only complete remediation. 2. If upgrade is not immediately possible, disable the Source Control feature in n8n instance settings. 3. Audit and tighten git repository write permissions — restrict to the absolute minimum set of trusted principals. 4. Rotate all credentials stored in n8n's credential vault as a precautionary measure, prioritizing LLM API keys and OAuth tokens. 5. Enable PostgreSQL query logging and review recent logs for anomalous SQL patterns (unexpected DDL/DML, UNION-based queries, stacked statements). 6. Review Source Control Pull history for unexpected file imports or unusual column naming patterns in Data Table JSON files. 7. Treat any n8n-connected git repository as a security boundary requiring the same controls as application code.
What systems are affected by CVE-2026-44792?
This vulnerability affects the following AI/ML architecture patterns: agent frameworks, AI orchestration pipelines, workflow automation, multi-service AI integrations.
What is the CVSS score for CVE-2026-44792?
No CVSS score has been assigned yet.
Technical Details
NVD Description
## Impact An attacker with write access to the git repository connected to an n8n Source Control configuration could commit a malicious Data Table JSON file containing a crafted column name. When an administrator performed a Source Control Pull, n8n imported the file and could lead to SQL injection on the internal PostgreSQL instance. Exploitation requires all of the following conditions: - The n8n instance uses PostgreSQL as its database backend. - The Source Control feature is enabled and connected to a repository the attacker can write to. - An administrator triggers a Source Control Pull. ## Patches The issue has been fixed in n8n version 1.123.43, 2.20.7, and 2.21.1. Users should upgrade to this version or later to remediate the vulnerability. ## Workarounds If upgrading is not immediately possible, administrators should consider the following temporary mitigations: - Disable the Source Control feature if it is not actively required. - Restrict write access to the connected git repository to fully trusted users only. - Avoid pulling from repositories that may have been modified by untrusted parties. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
Exploitation Scenario
A threat actor — insider, compromised developer account, or external attacker who has gained repository contributor access — crafts a Data Table JSON file containing a column name embedding a SQL injection payload (e.g., `legit_column'; INSERT INTO credentials (key,value) SELECT 'exfil_key', encode(data,'base64') FROM n8n_credential WHERE type='openAiApi'; --`). The file is committed to the n8n-connected Source Control repository under a plausible filename. When an administrator performs a routine Source Control Pull — a standard operation for syncing workflow definitions across environments — n8n ingests the malicious file and passes the unsanitized column name directly to a PostgreSQL query. The attacker achieves arbitrary SQL execution, exfiltrates the full credential store including LLM API keys, and establishes a foothold for lateral movement into every AI service and enterprise system n8n was authorized to access.
Weaknesses (CWE)
References
Timeline
Related Vulnerabilities
CVE-2026-33663 10.0 n8n: member role steals plaintext HTTP credentials
Same package: n8n CVE-2026-33660 10.0 TensorFlow: type confusion NPD in tensor conversion
Same package: n8n CVE-2026-21858 10.0 n8n: Input Validation flaw enables exploitation
Same package: n8n CVE-2026-27577 9.9 n8n: Code Injection enables RCE
Same package: n8n CVE-2026-27494 9.9 n8n: security flaw enables exploitation
Same package: n8n