Multiple vulnerabilities in n8n can be exploited by an attacker to execute arbitrary code, bypass security measures, disclose confidential information, perform SQL injection attacks, cause denial-of-service conditions, conduct cross-site scripting attacks, redirect users to malicious websites, or hijack sessions.
| Vendor | Product | Versions |
|---|---|---|
| — | n8n | — |