Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-mvh4-2cm2-6hpg

Опубликовано: 15 сент. 2025
Источник: github
Github: Прошло ревью
CVSS3: 4.1

Описание

Stored XSS in n8n LangChain Chat Trigger Node via initialMessages Parameter

Impact

A stored Cross-Site Scripting (XSS) vulnerability was identified in the @n8n/n8n-nodes-langchain.chatTrigger node in n8n. If an authorized user configures the node with malicious JavaScript in the initialMessages field and enables public access, the script will be executed in the browser of anyone who visits the resulting public chat URL.

This vulnerability could be exploited for phishing or to steal cookies or other sensitive data from users who access the public chat link, posing a security risk.

Patches

This issue has been patched in version 1.107.0 of n8n. Users should upgrade to version 1.107.0 or later.

Workarounds

Disabling the n8n-nodes-langchain.chatTrigger node (docs)

References

#18148

Пакеты

Наименование

n8n

npm
Затронутые версииВерсия исправления

>= 1.24.0, < 1.107.0

1.107.0

EPSS

Процентиль: 16%
0.0005
Низкий

4.1 Medium

CVSS3

Дефекты

CWE-79

Связанные уязвимости

CVSS3: 5.4
nvd
5 месяцев назад

n8n is an open source workflow automation platform. From 1.24.0 to before 1.107.0, there is a stored cross-site scripting (XSS) vulnerability in @n8n/n8n-nodes-langchain.chatTrigger. An authorized user can configure the LangChain Chat Trigger node with malicious JavaScript in the initialMessages field and enable public access so that the payload is executed in the browser of any user who visits the resulting public chat URL. This can be used for phishing or to steal cookies or other sensitive data from users accessing the public chat link. The issue is fixed in version 1.107.0. Updating to 1.107.0 or later is recommended. As a workaround, the affected chatTrigger node can be disabled. No other workarounds are known.

EPSS

Процентиль: 16%
0.0005
Низкий

4.1 Medium

CVSS3

Дефекты

CWE-79