CVE-2026-44790
AI description
CVE-2026-44790 is a vulnerability affecting the n8n workflow automation platform, specifically within the Git node's Push operation. An authenticated user who possesses permissions to create or modify workflows can exploit this flaw by injecting command-line interface (CLI) flags. This injection allows the attacker to read arbitrary files from the n8n server. This vulnerability is categorized as an argument injection bug (CWE-88). Successful exploitation could lead to the exposure of sensitive information such as configuration data, API keys, or credentials. Patches for CVE-2026-44790 have been released in n8n versions 1.123.43, 2.20.7, and 2.22.1.
- Description
- -
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
10
CVE-2026-44789, CVE-2026-44790 & CVE-2026-44791: 3 new vulnerabilities in n8n, 9.4 rating 🔥 Recently disclosed vulnerabilities in n8n allow an attacker to read arbitrary files from the server, achieve global prototype pollution and bypass the patch for previous vulnerabil
@Netlas_io
20 May 2026
5066 Impressions
18 Retweets
51 Likes
23 Bookmarks
2 Replies
0 Quotes
🚨 Upozorňujeme na sérii zranitelností v platformě n8n, CVE-2026-44789, CVE-2026-44790 a CVE-2026-44791. Byly identifikovány tři kritické chyby v nativních uzlech HTTP Request, Git a XML, které umožňují nízko-privilegovaným autentizovaným útočníkům s opráv
@GOVCERT_CZ
20 May 2026
559 Impressions
2 Retweets
7 Likes
0 Bookmarks
0 Replies
0 Quotes
n8nに重大な脆弱性(CVE-2026-44789・CVE-2026-44790・CVE-2026-44791) https://t.co/gsgKoLYpvA #セキュリティ対策Lab #security #securitynews
@securityLab_jp
20 May 2026
105 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2026-44790. 0day Intel: n8n fixes three critical 9.4 CVSS flaws (CVE-2026-44790/91/89). Authenticated us
@lyrie_ai
19 May 2026
46 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
n8nにCVSSスコア9.4の重大(Critical)な脆弱性が3件。CVE-2026-44790、CVE-2026-44791、CVE-2026-44789。ワークフローの作成/変更が可能なユーザがインフラ側で任意のコードを実行できる。修正版提供あり。 https://t.co/ioxgK7xj0u
@__kokumoto
18 May 2026
1111 Impressions
2 Retweets
7 Likes
3 Bookmarks
0 Replies
0 Quotes
🚨High - n8n Multiple Critical Vulnerabilities (CVE-2026-44791, CVE-2026-44792, CVE-2026-45732, CVE-2026-44789, CVE-2026-44790) Multiple high-severity vulnerabilities were disclosed in n8n, including Prototype Pollution leading to RCE (via XML Node and HTTP Request Node),
@UpwindMDR
14 May 2026
80 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes