Report: Complete Guide to CVE-2026-42231 - n8n: Prototype Pollution in XML Webhook Body Parser Leads to RCE

Report: Complete Guide to CVE-2026-42231 - n8n: Prototype Pollution in XML Webhook Body Parser Leads to RCE

CVE ID :CVE-2026-42231 Published : May 4, 2026, 7:16 p.m. | 57 minutes ago Description :n8n is an open source workflow automation platform. Prior to versions 1.123.32, 2.17.4, and 2.18.1, a flaw in the xml2js library used to parse XML request bodies in n8n's webhook handler allowed prototype pollution via a crafted XML payload. An authenticated user with permission to create or modify workflows could exploit this to pollute the JavaScript object prototype and, by chaining the pollution with the Git node's SSH operations, achieve remote code execution on the n8n host. This issue has been patched in versions 1.123.32, 2.17.4, and 2.18.1. Severity: 9.4 | CRITICAL Visit the link for more details, such as CVSS details, affected products, timeline, and more...

CVE Details

Severity
CRITICAL
Published
May 4, 2026
Impact: remote code execution