n8n CVE-2026-42233
MEDIUMLifecycle Timeline
2DescriptionNVD
Impact
A flaw in the Oracle Database node's select operation allowed user-controlled input passed into the Limit field via expressions to be interpolated directly into the SQL query without sanitization or parameterization. In workflows where external input is passed into the Limit field (e.g., from a webhook), an attacker could inject arbitrary SQL and exfiltrate data from the connected Oracle database.
Exploitation requires a specific workflow configuration:
- The Oracle Database node must be used with user-controlled input passed via expressions into the
Limitfield. - Authentication requirements depend on the workflow's configuration (e.g., an unauthenticated webhook endpoint would allow unauthenticated exploitation).
Patches
The issue has been fixed in n8n versions 1.123.32, 2.17.4, and 2.18.1. Users should upgrade to one of these versions or later to remediate the vulnerability.
Workarounds
If upgrading is not immediately possible, administrators should consider the following temporary mitigations:
- Limit workflow creation and editing permissions to fully trusted users only.
- Disable the Oracle Database node by adding
n8n-nodes-base.oracleDatabaseto theNODES_EXCLUDEenvironment variable. - Avoid passing unvalidated external user input into the Oracle Database node's
Limitfield via expressions.
These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
AnalysisAI
SQL injection in n8n's Oracle Database node allows attackers to inject arbitrary SQL commands through the Limit field when user-controlled input is passed via expressions, enabling data exfiltration from connected Oracle databases. Exploitation requires a specific workflow configuration where external input (e.g., from webhooks) reaches the Limit field; authentication depends on the webhook's access controls. …
Sign in for full analysis, threat intelligence, and remediation guidance.
More from same product – last 7 days
SmarterTools SmarterMail builds prior to 9610 contain a cryptographic weakness in the file and email sharing endpoints t
Admidio members_assignment_data.php endpoint leaks hidden profile field values through a blind search oracle attack. Rol
Traefik's BasicAuth middleware contains a timing side-channel vulnerability that allows attackers to enumerate valid use
Share
External POC / Exploit Code
Leaving vuln.today
GHSA-r6jc-mpqw-m755