GHSA-w673-8fjw-457c

GHSA-w673-8fjw-457c MEDIUM

n8n: stored XSS enables phishing via Form Node

Published March 27, 2026
CISO Take

Authenticated n8n users with workflow editor permissions can inject malicious HTML into Form Node descriptions or redirect form visitors to arbitrary external URLs, enabling targeted phishing attacks against your workforce. The low privilege bar—any workflow editor—makes this an insider-accessible threat in n8n deployments used for AI automation. Patch to 1.123.24, 2.10.4, or 2.12.0 immediately; if upgrading is blocked, restrict Form node access to fully trusted staff only.

Affected Systems

Package Ecosystem Vulnerable Range Patched
n8n npm >= 2.11.0, < 2.12.0 2.12.0

Do you use n8n? You're affected.

Severity & Risk

CVSS 3.1
4.1 / 10
EPSS
N/A
KEV Status
Not in KEV
Sophistication
Trivial

Recommended Action

  1. 1. Patch: Upgrade to n8n 1.123.24, 2.10.4, or 2.12.0 immediately. 2. Restrict permissions: Limit workflow creation and editing to fully trusted users—perform an IAM review of who holds editor roles. 3. Disable if unused: Add 'n8n-nodes-base.form' and 'n8n-nodes-base.formTrigger' to the NODES_EXCLUDE environment variable if Form nodes are not required. 4. Audit existing workflows: Review all Form Node configurations for unsanitized HTML in description fields (iframe tags, script tags) or suspicious external URLs. 5. Detection: Monitor n8n audit logs for workflow edits introducing external URL references or raw HTML in Form Node description fields.

Classification

Compliance Impact

This CVE is relevant to:

EU AI Act
Article 9 - Risk Management System
ISO 42001
A.9.4 - AI System Security
NIST AI RMF
MANAGE-2.2 - AI Risk Response Mechanisms
OWASP LLM Top 10
LLM05 - Improper Output Handling

Technical Details

NVD Description

## Impact An authenticated user with permission to create or modify workflows could configure a Form Node with an unsanitized HTML description field or exploit an overly permissive iframe sandbox policy to perform stored cross-site scripting or redirect end users visiting the form to an arbitrary external URL. The vulnerability could be used to facilitate phishing attacks. ## Patches The issue has been fixed in n8n versions 1.123.24, 2.10.4 and 2.12.0. Users should upgrade to one of these versions or later to remediate the vulnerability. ## Workarounds If upgrading is not immediately possible, administrators should consider the following temporary mitigations: - Limit workflow creation and editing permissions to fully trusted users only. - Disable the Form node by adding `n8n-nodes-base.form` to the `NODES_EXCLUDE` environment variable. - Disable the Form Trigger node by adding `n8n-nodes-base.formTrigger` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.

Exploitation Scenario

A malicious insider or compromised workflow editor account creates or modifies an n8n workflow. In the Form Node description, they inject an HTML payload with a credential-harvesting iframe or a JavaScript-based redirect. Legitimate employees receive a link to the internal n8n form—plausibly an AI data collection step or approval gate in an LLM pipeline—and are silently redirected to a convincing SSO phishing page. Harvested credentials are then used to pivot into cloud AI infrastructure, steal LLM API keys, or compromise connected SaaS integrations. The attack is amplified by the fact that the form URL originates from a trusted internal n8n instance.

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N

Timeline

Published
March 27, 2026
Last Modified
March 27, 2026
First Seen
March 27, 2026