| Summary | n8n is a workflow automation platform. From 1.77.0 to before 1.98.2, a stored Cross-Site Scripting (XSS) vulnerability was identified in n8n, specifically in the Form Trigger node's HTML form element. An authenticated attacker can inject malicious HTML via an <iframe> with a srcdoc payload that includes arbitrary JavaScript execution. The attacker can also inject malicious Javascript by using <video> coupled <source> using an onerror event. While using iframe or a combination of video and source tag, this vulnerability allows for Account Takeover (ATO) by exfiltrating n8n-browserId and session cookies from authenticated users who visit a maliciously crafted form. Using these tokens and cookies, an attacker can impersonate the victim and change account details such as email addresses, enabling full control over the account—especially if 2FA is not enabled. Users should upgrade to version >= 1.98.2. |
|---|---|
| Publication Date | Aug. 20, 2025, 2:15 a.m. |
| Registration Date | Aug. 20, 2025, 4 a.m. |
| Last Update | Aug. 20, 2025, 2:15 a.m. |
| Title | Node.js 用 n8n におけるクロスサイトスクリプティングの脆弱性 |
|---|---|
| Summary | Node.js 用 n8n には、クロスサイトスクリプティングの脆弱性が存在します。 |
| Possible impacts | 情報を取得される、および情報を改ざんされる可能性があります。 |
| Solution | ベンダアドバイザリまたはパッチ情報が公開されています。参考情報を参照して適切な対策を実施してください。 |
| Publication Date | Aug. 19, 2025, midnight |
| Registration Date | Sept. 4, 2025, 3:49 p.m. |
| Last Update | Sept. 4, 2025, 3:49 p.m. |
| n8n |
| n8n 1.77.0 以上 1.98.2 未満 |
| No | Changed Details | Date of change |
|---|---|---|
| 1 | [2025年09月04日] 掲載 |
Sept. 4, 2025, 3:49 p.m. |