n8n CVE Vulnerabilities & Metrics

Focus on n8n vulnerabilities and metrics.

Last updated: 18 May 2025, 22:25 UTC

About n8n Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with n8n. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total n8n CVEs: 4
Earliest CVE date: 10 May 2023, 15:15 UTC
Latest CVE date: 29 Apr 2025, 05:15 UTC

Latest CVE reference: CVE-2025-46343

Rolling Stats

30-day Count (Rolling): 1
365-day Count (Rolling): 1

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): 0%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): 0.0%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical n8n CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 0.0

Max CVSS: 0

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 4
4.0-6.9 0
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS n8n CVEs

These are the five CVEs with the highest CVSS scores for n8n, sorted by severity first and recency.

All CVEs for n8n

CVE-2025-46343 n8n vulnerability CVSS: 0 29 Apr 2025, 05:15 UTC

n8n is a workflow automation platform. Prior to version 1.90.0, n8n is vulnerable to stored cross-site scripting (XSS) through the attachments view endpoint. n8n workflows can store and serve binary files, which are accessible to authenticated users. However, there is no restriction on the MIME type of uploaded files, and the MIME type could be controlled via a GET parameter. This allows the server to respond with any MIME type, potentially enabling malicious content to be interpreted and executed by the browser. An authenticated attacker with member-level permissions could exploit this by uploading a crafted HTML file containing malicious JavaScript. When another user visits the binary data endpoint with the MIME type set to text/html, the script executes in the context of the user’s session. This script could send a request to change the user’s email address in their account settings, effectively enabling account takeover. This issue has been patched in version 1.90.0.

CVE-2023-27564 n8n vulnerability CVSS: 0 10 May 2023, 15:15 UTC

The n8n package 0.218.0 for Node.js allows Information Disclosure.

CVE-2023-27563 n8n vulnerability CVSS: 0 10 May 2023, 15:15 UTC

The n8n package 0.218.0 for Node.js allows Escalation of Privileges.

CVE-2023-27562 n8n vulnerability CVSS: 0 10 May 2023, 15:15 UTC

The n8n package 0.218.0 for Node.js allows Directory Traversal.