Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| # | POC Description | Source Link | Shenlong Link |
|---|
No public POC found.
Login to generate AI POC| CVE-2026-27496 | n8n has In-Process Memory Disclosure in its Task Runner | |
| CVE-2026-33660 | n8n Has Multiple Remote Code Execution Vulnerabilities in Merge Node AlaSQL SQL Mode | |
| CVE-2026-33663 | n8n Vulnerable to Credential Theft via Name-Based Resolution and Permission Checker Bypass | |
| CVE-2026-33665 | n8n: LDAP Email-Based Account Linking Allows Privilege Escalation and Account Takeover | |
| CVE-2026-33713 | n8n Vulnerable to SQL Injection in Data Table Node via orderByColumn Expression | |
| CVE-2026-33722 | n8n Has External Secrets Authorization Bypass in Credential Saving | |
| CVE-2026-33720 | n8n Has Authorization Bypass in OAuth Callback via N8N_SKIP_AUTH_ON_OAUTH_CALLBACK | |
| CVE-2026-33724 | n8n's Source Control SSH Configuration Uses StrictHostKeyChecking=no | |
| CVE-2026-33749 | n8n Vulnerable to XSS via Binary Data Inline HTML Rendering | |
| CVE-2026-33751 | n8n Vulnerable to LDAP Filter Injection in LDAP Node |
No comments yet