Advisory Database
  • Advisories
  • Dependency Scanning
  1. npm
  2. ›
  3. n8n
  4. ›
  5. CVE-2026-42231

CVE-2026-42231: n8n has Prototype Pollution in XML Webhook Body Parser that Leads to RCE

April 29, 2026 (updated May 8, 2026)

A flaw in the xml2js library used to parse XML request bodies in n8n’s webhook handler allowed prototype pollution via a crafted XML payload. An authenticated user with permission to create or modify workflows could exploit this to pollute the JavaScript object prototype and, by chaining the pollution with the Git node’s SSH operations, achieve remote code execution on the n8n host.

References

  • github.com/advisories/GHSA-q5f4-99jv-pgg5
  • github.com/n8n-io/n8n
  • github.com/n8n-io/n8n/security/advisories/GHSA-q5f4-99jv-pgg5
  • nvd.nist.gov/vuln/detail/CVE-2026-42231

Code Behaviors & Features

Detect and mitigate CVE-2026-42231 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions before 1.123.32, all versions starting from 2.17.0 before 2.17.4, all versions starting from 2.18.0 before 2.18.1

Fixed versions

  • 1.123.32
  • 2.18.1
  • 2.17.4

Solution

Upgrade to versions 1.123.32, 2.17.4, 2.18.1 or above.

Impact 8.8 HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Learn more about CVSS

Weakness

  • CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution')

Source file

npm/n8n/CVE-2026-42231.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Sat, 09 May 2026 12:18:39 +0000.