CVE-2023-27562:
n8n Directory Traversal vulnerability
6.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.77122%
CWE
Published
5/10/2023
Updated
11/27/2023
KEV Status
No
Technology
JavaScript
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
n8n | npm | < 0.216.1 | 0.216.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from improper path sanitization in BinaryDataManager
. The pre-patch versions used path.join()
with user-controlled input (identifier parameter) without validation()
. The commit introduced resolveStoragePath()
to check for path traversal attempts. The getBinaryPath
and getMetadataPath
functions were directly vulnerable as they handled user-supplied identifiers and constructed file paths without preventing directory traversal sequences. The high confidence comes from the explicit path traversal checks added in the patch and CWE-22 mapping in the advisory.