๐Ÿ” CVE Alert

CVE-2026-42231

UNKNOWN 0.0

n8n: Prototype Pollution in XML Webhook Body Parser Leads to RCE

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, a flaw in the xml2js library used to parse XML request bodies in n8n's webhook handler allowed prototype pollution via a crafted XML payload. An authenticated user with permission to create or modify workflows could exploit this to pollute the JavaScript object prototype and, by chaining the pollution with the Git node's SSH operations, achieve remote code execution on the n8n host. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1.

CWE CWE-1321
Vendor n8n-io
Product n8n
Published May 4, 2026
Last Updated May 4, 2026
Stay Ahead of the Next One

Get instant alerts for n8n-io n8n

Be the first to know when new unknown vulnerabilities affecting n8n-io n8n are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

n8n-io / n8n
< 1.123.32 >= 2.17.0, < 2.17.4 >= 2.18.0, < 2.18.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/n8n-io/n8n/security/advisories/GHSA-q5f4-99jv-pgg5