JustAppSec
Back to news

Prototype pollution in n8n nodes can lead to RCE

1 min readPublished 25 Mar 2026Updated 25 Mar 2026Source: CVEProject (cvelistV5)

TL;DR — A critical prototype pollution bug in n8n node configuration can let authenticated workflow editors reach remote code execution on the n8n host.

What happened

n8n is an open-source workflow automation platform that connects apps/APIs via configurable nodes and executes workflows on a central server.

CVE-2026-33696 describes a prototype pollution issue in n8n’s XML and GSuiteAdmin nodes where a user who can create/modify workflows can supply crafted node parameters to write attacker-controlled values onto Object.prototype, which can then be leveraged to achieve remote code execution on the instance.

Severity is CVSS v4.0 9.4 (Critical). This is high-leverage risk in shared/self-hosted n8n deployments because “workflow editor” privileges are commonly delegated, and a single node-level bug can collapse the trust boundary into full server-side execution.

Who is impacted

  • n8n deployments where users have permission to create or modify workflows and can access the XML and/or GSuiteAdmin nodes.
ComponentAffected versions (per CVE record)Fixed versions (per CVE record)
n8n< 1.123.271.123.27
n8n>= 2.0.0-rc.0, < 2.13.32.13.3
n8n= 2.14.02.14.1

What to do now

  • Follow vendor remediation guidance and apply a fixed release.

    "Users should upgrade to one of these versions or later to remediate the vulnerability."

  • If upgrading is not immediately possible, treat workflow editing as a high-risk permission and reduce exposure.

    "Limit workflow creation and editing permissions to fully trusted users only"

  • Consider temporarily removing the vulnerable node from runtime availability until patching completes.

    "disable the XML node by adding n8n-nodes-base.xml to the NODES_EXCLUDE environment variable."


Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.