Description
n8n is an open source workflow automation platform. Prior to version 1.123.2, a Cross-Site Scripting (XSS) vulnerability has been identified in the handling of webhook responses and related HTTP endpoints. Under certain conditions, the Content Security Policy (CSP) sandbox protection intended to isolate HTML responses may not be applied correctly. An authenticated user with permission to create or modify workflows could abuse this to execute malicious scripts with same-origin privileges when other users interact with the crafted workflow. This could lead to session hijacking and account takeover. This issue has been patched in version 1.123.2.
References (3)
Core 3
Core References
Patch, Vendor Advisory x_refsource_confirm
https://github.com/n8n-io/n8n/security/advisories/GHSA-825q-w924-xhgx
Patch x_refsource_misc
https://github.com/n8n-io/n8n/commit/ced34c0f93ab4c759a56065965986094d8ef7323
Patch x_refsource_misc
https://github.com/n8n-io/n8n/commit/e8cf4d6bb3af94dc296cbb67bc3dd20e9b508ac9
Scores
CVSS v3
5.4
EPSS
0.0001
EPSS Percentile
2.4%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-79
Status
published
Products (2)
n8n/n8n
< 1.123.2
npm/n8n
1.123.0 - 1.123.2npm
Published
Feb 04, 2026
Tracked Since
Feb 18, 2026