n8n's workflow automation API allows any authenticated user with credential access to abuse the POST /rest/dynamic-node-parameters/options endpoint, forcing the server to issue HTTP requests to arbitrary hosts using stored credentials — completely bypassing the intended Allowed HTTP Request Domains safeguard. With a CVSS of 9.1 Critical and Scope:Changed, even a low-privilege account can pivot to cloud metadata endpoints (AWS IMDSv1, GCP, Azure IMDS), internal AI infrastructure, or any service reachable from the n8n host — using whatever API keys or tokens are stored in the platform. n8n is a popular AI agent orchestration layer frequently wired to OpenAI, Anthropic, vector databases, and cloud services, making its credential store a high-value target with a broad blast radius across connected AI pipelines. Patch to n8n 2.20.0 immediately; if upgrade is not possible, restrict platform access to fully trusted users only, audit all credential sharing, and block IMDS addresses at the network level.
What is the risk?
Critical risk. CVSS 9.1 with Scope:Changed means a successful exploit crosses a security boundary — the n8n server itself becomes a proxy for attacker-directed requests. Privileges required is Low (any authenticated user), Attack Complexity is Low, and no User Interaction is needed, making this trivially weaponizable by any insider or compromised account. The platform's role as an AI workflow orchestrator means stored credentials routinely include LLM API keys, vector DB tokens, and cloud IAM credentials. No public exploit or KEV listing at time of analysis, but the exploitation pattern is well-understood and requires no specialized skill. The 85 historical CVEs in the same package and an OpenSSF Scorecard of 6.1/10 indicate a sustained security debt in this codebase.
Attack Kill Chain
What systems are affected?
| Package | Ecosystem | Vulnerable Range | Patched |
|---|---|---|---|
| n8n | npm | < 2.20.0 | 2.20.0 |
Do you use n8n? You're affected.
Severity & Risk
Attack Surface
What should I do?
1 step-
1) PATCH: Upgrade n8n to version 2.20.0 or later — the only full remediation. 2) RESTRICT: If immediate patching is not feasible, limit n8n access to fully trusted users only and revoke credential sharing with non-essential accounts. 3) NETWORK: Block access from the n8n server to cloud metadata addresses (169.254.169.254, fd00:ec2::254) and enforce egress allowlists at the network layer. 4) AUDIT: Review all stored credentials in n8n — rotate any that may have been exposed, especially LLM API keys and cloud IAM tokens. 5) DETECT: Monitor n8n server outbound HTTP traffic for anomalous destinations; alert on requests to RFC1918 ranges, IMDS endpoints, or hosts not in the declared Allowed HTTP Request Domains list. 6) LOG: Enable n8n audit logging and review POST requests to /rest/dynamic-node-parameters/options for unusual option endpoint URLs.
Classification
Compliance Impact
This CVE is relevant to:
Frequently Asked Questions
What is GHSA-3875-8gcx-7v46?
n8n's workflow automation API allows any authenticated user with credential access to abuse the POST /rest/dynamic-node-parameters/options endpoint, forcing the server to issue HTTP requests to arbitrary hosts using stored credentials — completely bypassing the intended Allowed HTTP Request Domains safeguard. With a CVSS of 9.1 Critical and Scope:Changed, even a low-privilege account can pivot to cloud metadata endpoints (AWS IMDSv1, GCP, Azure IMDS), internal AI infrastructure, or any service reachable from the n8n host — using whatever API keys or tokens are stored in the platform. n8n is a popular AI agent orchestration layer frequently wired to OpenAI, Anthropic, vector databases, and cloud services, making its credential store a high-value target with a broad blast radius across connected AI pipelines. Patch to n8n 2.20.0 immediately; if upgrade is not possible, restrict platform access to fully trusted users only, audit all credential sharing, and block IMDS addresses at the network level.
Is GHSA-3875-8gcx-7v46 actively exploited?
No confirmed active exploitation of GHSA-3875-8gcx-7v46 has been reported, but organizations should still patch proactively.
How to fix GHSA-3875-8gcx-7v46?
1) PATCH: Upgrade n8n to version 2.20.0 or later — the only full remediation. 2) RESTRICT: If immediate patching is not feasible, limit n8n access to fully trusted users only and revoke credential sharing with non-essential accounts. 3) NETWORK: Block access from the n8n server to cloud metadata addresses (169.254.169.254, fd00:ec2::254) and enforce egress allowlists at the network layer. 4) AUDIT: Review all stored credentials in n8n — rotate any that may have been exposed, especially LLM API keys and cloud IAM tokens. 5) DETECT: Monitor n8n server outbound HTTP traffic for anomalous destinations; alert on requests to RFC1918 ranges, IMDS endpoints, or hosts not in the declared Allowed HTTP Request Domains list. 6) LOG: Enable n8n audit logging and review POST requests to /rest/dynamic-node-parameters/options for unusual option endpoint URLs.
What systems are affected by GHSA-3875-8gcx-7v46?
This vulnerability affects the following AI/ML architecture patterns: AI agent orchestration platforms, LLM API integration pipelines, RAG pipelines with n8n connectors, cloud-hosted AI infrastructure, MLOps workflow automation.
What is the CVSS score for GHSA-3875-8gcx-7v46?
GHSA-3875-8gcx-7v46 has a CVSS v3.1 base score of 9.1 (CRITICAL).
Technical Details
NVD Description
## Impact The `POST /rest/dynamic-node-parameters/options` endpoint allowed any authenticated user to cause the n8n server to issue HTTP requests including credentials bypassing the intended restrictions on which hosts could be contacted for that credential (Allowed HTTP Request Domains). The user needed to be authenticated and have access to the credential. ## Patches The issue has been fixed in n8n version 2.20.0. Users should upgrade to this version or later to remediate the vulnerability. ## Workarounds If upgrading is not immediately possible, administrators should consider the following temporary mitigations: - Restrict n8n access to fully trusted users only. - Limit credential sharing to users who genuinely require access to those credentials. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
Exploitation Scenario
An attacker with a low-privilege n8n account — obtained via phishing, credential stuffing, or insider access — identifies a shared credential (e.g., an OpenAI API key or AWS integration token) they have access to. They send a crafted POST to /rest/dynamic-node-parameters/options with the options endpoint URL set to http://169.254.169.254/latest/meta-data/iam/security-credentials/ (AWS IMDS). The n8n server, bypassing its own domain restriction, executes the outbound request and returns the response containing temporary IAM role credentials. The attacker uses these credentials to authenticate directly to AWS, accessing S3 buckets containing training data, model artifacts, or RAG document stores — or deploys further resources at the victim's expense. The entire chain requires only a valid n8n session and one HTTP request.
Weaknesses (CWE)
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:L References
Timeline
Related Vulnerabilities
CVE-2026-33663 10.0 n8n: member role steals plaintext HTTP credentials
Same package: n8n CVE-2026-33660 10.0 TensorFlow: type confusion NPD in tensor conversion
Same package: n8n CVE-2026-21858 10.0 n8n: Input Validation flaw enables exploitation
Same package: n8n CVE-2026-27577 9.9 n8n: Code Injection enables RCE
Same package: n8n CVE-2026-27494 9.9 n8n: security flaw enables exploitation
Same package: n8n