Multiple Critical n8n Workflow Automation Vulnerabilities (CVE-2025-68613, CVE-2025-68668, CVE-2026-21877, CVE-2026-21858)
Summary
Hide ▲
Show ▼
Multiple critical vulnerabilities in the n8n workflow automation platform continue to pose severe risks, with the latest flaw, **CVE-2026-25049 (CVSS 9.4)**, enabling authenticated users to execute arbitrary system commands via malicious workflows. This vulnerability bypasses earlier patches for CVE-2025-68613 and stems from inadequate sanitization in n8n’s expression evaluation, allowing attackers to exploit TypeScript’s compile-time type system mismatches with JavaScript’s runtime behavior. Successful exploitation can lead to server compromise, credential theft, and persistent backdoor installation, with heightened risk when paired with n8n’s public webhook feature. The vulnerabilities collectively affect over **105,000 exposed instances**, primarily in the U.S. and Europe, and impact both self-hosted and cloud deployments. Earlier flaws—including **CVE-2026-21877 (CVSS 10.0)**, **CVE-2026-21858 (CVSS 10.0)**, and sandbox escape vulnerabilities **CVE-2026-1470 (CVSS 9.9)** and **CVE-2026-0863 (CVSS 8.5)**—have already demonstrated the potential for full server takeover, AI workflow hijacking, and exposure of sensitive credentials (API keys, OAuth tokens, database passwords). Patches are available in versions **1.123.17, 2.4.5, 2.5.1, and 2.5.2**, but unpatched systems remain at critical risk. Users are urged to **upgrade immediately**, restrict workflow permissions, and harden deployment environments to mitigate exposure.
Timeline
-
04.02.2026 23:14 2 articles · 1d ago
Critical n8n vulnerabilities (CVE-2026-25049) disclosed with public exploits
Multiple critical vulnerabilities in n8n, collectively tracked as **CVE-2026-25049 (CVSS 9.4)**, stem from inadequate sanitization mechanisms that bypass patches for CVE-2025-68613. The flaw allows **authenticated users with workflow creation/modification permissions** to execute arbitrary system commands via crafted expressions in workflow parameters, exploiting a **mismatch between TypeScript’s compile-time type system and JavaScript’s runtime behavior**. Attackers can bypass sanitization by passing non-string values (e.g., objects, arrays) at runtime. The vulnerability affects versions **<1.123.17 and <2.5.2**, with fixes released in **1.123.17 and 2.5.2**. Researchers from **SecureLayer7, Pillar Security, and Endor Labs** demonstrated exploits where a **publicly accessible webhook** in a malicious workflow enables remote command execution, server compromise, and credential theft (API keys, OAuth tokens, database passwords). The risk escalates when combined with n8n’s webhook feature, allowing unauthenticated remote triggering. Ten security researchers, including **Fatih Çelik, Cris Staicu, Eilon Cohen, and Sandeep Kamble**, are credited with discovering the flaw. Users are advised to **upgrade to patched versions**, restrict workflow permissions to trusted users, and deploy n8n in hardened environments with limited OS privileges. Temporary mitigations include auditing workflows for suspicious expressions and rotating encryption keys/credentials.
Show sources
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
- Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows — thehackernews.com — 05.02.2026 08:16
-
04.02.2026 15:00 2 articles · 1d ago
Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover
Researchers at Pillar Security have found two maximum severity vulnerabilities (CVSS score of 10.0) in n8n, a popular open-source workflow automation platform powering hundreds of thousands of enterprise AI systems worldwide. The flaws are sandbox escape vulnerabilities which, when exploited, allow any authenticated user to achieve complete server control and steal any stored credential, including API keys, cloud provider keys, database passwords, and OAuth tokens on both self-hosted and cloud n8n instances. The first flaw was reported by Pillar Security to n8n maintainers, who released a patch, but a second vulnerability bypassing the fix was discovered 24 hours after initial patch was deployed. n8n released a new patched version, version 2.4.0, with fixes for both vulnerabilities, in January 2026. The Pillar Security advisory addressing both flaws has a GitHub vulnerability identifier, GHSA-6cqr-8cfr-67f8, but the firm did not reveal the CVE identifier for either of the vulnerabilities. The Pillar Security researchers noted that companies using n8n for AI orchestration face credential exposure when using OpenAI, Anthropic, Azure OpenAI, and Hugging Face as well as vector database access (e.g., Pinecone, Weaviate, Qdrant). Attackers who successfully exploit either of these flaws can intercept AI prompts, modify AI responses, redirect traffic through attacker-controlled endpoints, and exfiltrate sensitive data from AI interactions. Additionally, on n8n cloud, a single compromised user could potentially access shared infrastructure and other customers' data within the Kubernetes cluster.
Show sources
- Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover — www.infosecurity-magazine.com — 04.02.2026 15:00
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
28.01.2026 14:43 4 articles · 8d ago
Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
The article provides detailed information on two new vulnerabilities affecting the n8n workflow automation platform, tracked as CVE-2026-1470 and CVE-2026-0863. These flaws, discovered by the JFrog Security Research team, allow authenticated attackers to bypass sandbox mechanisms and achieve remote code execution. The article explains the technical details of the vulnerabilities, including how they can be exploited to run arbitrary commands on systems hosting vulnerable n8n instances. Users are advised to upgrade to the latest patched versions to address these flaws. The article also highlights the difficulty in safely sandboxing dynamic, high-level languages such as JavaScript and Python, emphasizing that even with multiple validation layers, deny lists, and AST-based controls in place, subtle language features and runtime behaviors can be leveraged to bypass security assumptions. The n8n cloud platform has addressed the issues, and only self-hosted versions running a vulnerable release are affected. Researcher Rhoda Smart promised to add a proof-of-concept exploit in a technical blog post, which could prompt attackers to hunt for and target self-hosted n8n deployments.
Show sources
- Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution — thehackernews.com — 28.01.2026 14:43
- Critical and High Severity n8n Sandbox Flaws Allow RCE — www.infosecurity-magazine.com — 28.01.2026 18:00
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
07.01.2026 15:48 7 articles · 29d ago
Critical Unauthenticated RCE Vulnerability (CVE-2026-21858) Disclosed
The article provides detailed information on the Ni8mare vulnerability (CVE-2026-21858) in the n8n workflow automation platform. It highlights the severity of the flaw, which allows unauthenticated remote attackers to gain complete control over susceptible instances. The article also explains the technical details of the vulnerability, including how it relates to the webhooks that start workflows in n8n and the parsing of incoming data based on the 'content-type' header. It emphasizes the potential impact of the vulnerability, which could enable attackers to access sensitive information and compromise enterprise secrets. The article also notes that there are no official workarounds available for Ni8mare, with users urged to upgrade to version 1.121.0 or later to remediate. Over 105,753 unpatched instances of n8n were found exposed online, with 59,558 still exposed on Sunday. More than 28,000 IPs were found in the United States and over 21,000 in Europe. The Pillar Security advisory addressing both flaws has a GitHub vulnerability identifier, GHSA-6cqr-8cfr-67f8, but the CVE identifier for either of the vulnerabilities was not revealed. The vulnerabilities allow authenticated users to achieve complete server control and steal stored credentials, including API keys, cloud provider keys, database passwords, and OAuth tokens. The first flaw was reported by Pillar Security to n8n maintainers, who released a patch, but a second vulnerability bypassing the fix was discovered 24 hours after the initial patch was deployed. n8n released a new patched version, version 2.4.0, with fixes for both vulnerabilities, in January 2026. Companies using n8n for AI orchestration face credential exposure when using OpenAI, Anthropic, Azure OpenAI, and Hugging Face as well as vector database access (e.g., Pinecone, Weaviate, Qdrant). Attackers who exploit these flaws can intercept AI prompts, modify AI responses, redirect traffic through attacker-controlled endpoints, and exfiltrate sensitive data from AI interactions. On n8n cloud, a single compromised user could potentially access shared infrastructure and other customers' data within the Kubernetes cluster. Pillar Security recommended upgrading to n8n version 2.4.0 or later, rotating the encryption key and all credentials, auditing workflows, and monitoring AI workflows for unusual patterns.
Show sources
- Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control — thehackernews.com — 07.01.2026 15:48
- Max severity Ni8mare flaw lets hackers hijack n8n servers — www.bleepingcomputer.com — 07.01.2026 19:41
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution — thehackernews.com — 28.01.2026 14:43
- Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover — www.infosecurity-magazine.com — 04.02.2026 15:00
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
07.01.2026 13:26 4 articles · 29d ago
New CVSS 10.0 RCE Vulnerability (CVE-2026-21877) Disclosed
A new maximum-severity vulnerability (CVSS 10.0, CVE-2026-21877) has been discovered in n8n, affecting versions >= 0.123.0 and < 1.121.3. This flaw has been patched in version 1.121.3, released in November 2025. Both self-hosted and n8n Cloud instances are impacted. Users are advised to upgrade to the latest version or implement mitigations such as disabling the Git node and limiting access for untrusted users.
Show sources
- n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions — thehackernews.com — 07.01.2026 13:26
- Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control — thehackernews.com — 07.01.2026 15:48
- Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution — thehackernews.com — 28.01.2026 14:43
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
23.12.2025 09:34 4 articles · 1mo ago
Critical n8n Vulnerability (CVE-2025-68613) Disclosed
A critical vulnerability in n8n workflow automation platform, tracked as CVE-2025-68613, has been disclosed. The flaw, with a CVSS score of 9.9, affects versions 0.211.0 to 1.120.4 and has been patched in versions 1.120.4, 1.121.1, and 1.122.0. Over 103,000 instances are potentially vulnerable, with a significant number located in the U.S., Germany, France, Brazil, and Singapore. The vulnerability allows authenticated users to execute arbitrary code with the privileges of the n8n process, potentially leading to full compromise of the affected instance, unauthorized data access, and system-level operations. Users are advised to apply patches immediately or implement mitigations such as restricting workflow permissions and deploying n8n in a hardened environment.
Show sources
- Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances — thehackernews.com — 23.12.2025 09:34
- n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions — thehackernews.com — 07.01.2026 13:26
- Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution — thehackernews.com — 28.01.2026 14:43
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
Information Snippets
-
The vulnerability, tracked as CVE-2025-68613, has a CVSS score of 9.9.
First reported: 23.12.2025 09:342 sources, 5 articlesShow sources
- Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances — thehackernews.com — 23.12.2025 09:34
- n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions — thehackernews.com — 07.01.2026 13:26
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The flaw affects n8n versions 0.211.0 and higher, up to 1.120.4.
First reported: 23.12.2025 09:342 sources, 3 articlesShow sources
- Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances — thehackernews.com — 23.12.2025 09:34
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The vulnerability has been patched in versions 1.120.4, 1.121.1, and 1.122.0.
First reported: 23.12.2025 09:342 sources, 3 articlesShow sources
- Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances — thehackernews.com — 23.12.2025 09:34
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
There are 103,476 potentially vulnerable instances as of December 22, 2025.
First reported: 23.12.2025 09:342 sources, 3 articlesShow sources
- Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances — thehackernews.com — 23.12.2025 09:34
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The majority of vulnerable instances are located in the U.S., Germany, France, Brazil, and Singapore.
First reported: 23.12.2025 09:342 sources, 3 articlesShow sources
- Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances — thehackernews.com — 23.12.2025 09:34
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The vulnerability allows authenticated users to execute arbitrary code with the privileges of the n8n process.
First reported: 23.12.2025 09:342 sources, 4 articlesShow sources
- Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances — thehackernews.com — 23.12.2025 09:34
- n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions — thehackernews.com — 07.01.2026 13:26
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
Successful exploitation could lead to full compromise of the affected instance, unauthorized data access, and system-level operations.
First reported: 23.12.2025 09:342 sources, 4 articlesShow sources
- Critical n8n Flaw (CVSS 9.9) Enables Arbitrary Code Execution Across Thousands of Instances — thehackernews.com — 23.12.2025 09:34
- n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions — thehackernews.com — 07.01.2026 13:26
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
A new vulnerability, CVE-2026-21877, has been discovered in n8n with a CVSS score of 10.0.
First reported: 07.01.2026 13:262 sources, 3 articlesShow sources
- n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions — thehackernews.com — 07.01.2026 13:26
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The vulnerability affects n8n versions >= 0.123.0 and < 1.121.3.
First reported: 07.01.2026 13:262 sources, 5 articlesShow sources
- n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions — thehackernews.com — 07.01.2026 13:26
- Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control — thehackernews.com — 07.01.2026 15:48
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The flaw has been patched in version 1.121.3, released in November 2025.
First reported: 07.01.2026 13:262 sources, 4 articlesShow sources
- n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions — thehackernews.com — 07.01.2026 13:26
- Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control — thehackernews.com — 07.01.2026 15:48
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
Both self-hosted and n8n Cloud instances are impacted by the vulnerability.
First reported: 07.01.2026 13:262 sources, 4 articlesShow sources
- n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions — thehackernews.com — 07.01.2026 13:26
- Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control — thehackernews.com — 07.01.2026 15:48
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
Security researcher Théo Lelasseux discovered and reported the flaw.
First reported: 07.01.2026 13:262 sources, 4 articlesShow sources
- n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions — thehackernews.com — 07.01.2026 13:26
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
Users are advised to upgrade to version 1.121.3 or later to address the vulnerability.
First reported: 07.01.2026 13:263 sources, 6 articlesShow sources
- n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions — thehackernews.com — 07.01.2026 13:26
- Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control — thehackernews.com — 07.01.2026 15:48
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover — www.infosecurity-magazine.com — 04.02.2026 15:00
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
If immediate patching is not possible, administrators should disable the Git node and limit access for untrusted users.
First reported: 07.01.2026 13:261 source, 2 articlesShow sources
- n8n Warns of CVSS 10.0 RCE Vulnerability Affecting Self-Hosted and Cloud Versions — thehackernews.com — 07.01.2026 13:26
- Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control — thehackernews.com — 07.01.2026 15:48
-
The vulnerability, tracked as CVE-2026-21858, has a CVSS score of 10.0.
First reported: 07.01.2026 15:483 sources, 3 articlesShow sources
- Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control — thehackernews.com — 07.01.2026 15:48
- Max severity Ni8mare flaw lets hackers hijack n8n servers — www.bleepingcomputer.com — 07.01.2026 19:41
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
-
The flaw affects all versions of n8n prior to and including 1.65.0.
First reported: 07.01.2026 15:483 sources, 5 articlesShow sources
- Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control — thehackernews.com — 07.01.2026 15:48
- Max severity Ni8mare flaw lets hackers hijack n8n servers — www.bleepingcomputer.com — 07.01.2026 19:41
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The vulnerability has been patched in version 1.121.0, released on November 18, 2025.
First reported: 07.01.2026 15:483 sources, 6 articlesShow sources
- Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control — thehackernews.com — 07.01.2026 15:48
- Max severity Ni8mare flaw lets hackers hijack n8n servers — www.bleepingcomputer.com — 07.01.2026 19:41
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The latest versions of n8n are 1.123.10, 2.1.5, 2.2.4, and 2.3.0.
First reported: 07.01.2026 15:483 sources, 6 articlesShow sources
- Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control — thehackernews.com — 07.01.2026 15:48
- Max severity Ni8mare flaw lets hackers hijack n8n servers — www.bleepingcomputer.com — 07.01.2026 19:41
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The vulnerability allows unauthenticated remote attackers to gain complete control over susceptible instances.
First reported: 07.01.2026 15:483 sources, 6 articlesShow sources
- Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control — thehackernews.com — 07.01.2026 15:48
- Max severity Ni8mare flaw lets hackers hijack n8n servers — www.bleepingcomputer.com — 07.01.2026 19:41
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The flaw is codenamed Ni8mare by Cyera Research Labs.
First reported: 07.01.2026 15:483 sources, 7 articlesShow sources
- Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control — thehackernews.com — 07.01.2026 15:48
- Max severity Ni8mare flaw lets hackers hijack n8n servers — www.bleepingcomputer.com — 07.01.2026 19:41
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution — thehackernews.com — 28.01.2026 14:43
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
Security researcher Dor Attias discovered and reported the flaw on November 9, 2025.
First reported: 07.01.2026 15:482 sources, 5 articlesShow sources
- Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control — thehackernews.com — 07.01.2026 15:48
- Max severity Ni8mare flaw lets hackers hijack n8n servers — www.bleepingcomputer.com — 07.01.2026 19:41
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The vulnerability is rooted in the n8n webhook and file handling mechanism.
First reported: 07.01.2026 15:482 sources, 5 articlesShow sources
- Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control — thehackernews.com — 07.01.2026 15:48
- Max severity Ni8mare flaw lets hackers hijack n8n servers — www.bleepingcomputer.com — 07.01.2026 19:41
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The flaw occurs due to a "Content-Type" confusion flaw.
First reported: 07.01.2026 15:482 sources, 5 articlesShow sources
- Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control — thehackernews.com — 07.01.2026 15:48
- Max severity Ni8mare flaw lets hackers hijack n8n servers — www.bleepingcomputer.com — 07.01.2026 19:41
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The vulnerability can be exploited to extract sensitive secrets, forge administrator access, and execute arbitrary commands on the server.
First reported: 07.01.2026 15:482 sources, 5 articlesShow sources
- Critical n8n Vulnerability (CVSS 10.0) Allows Unauthenticated Attackers to Take Full Control — thehackernews.com — 07.01.2026 15:48
- Max severity Ni8mare flaw lets hackers hijack n8n servers — www.bleepingcomputer.com — 07.01.2026 19:41
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
n8n is an open-source workflow automation tool with over 50,000 weekly downloads on npm and more than 100 million pulls on Docker Hub.
First reported: 07.01.2026 19:411 source, 4 articlesShow sources
- Max severity Ni8mare flaw lets hackers hijack n8n servers — www.bleepingcomputer.com — 07.01.2026 19:41
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The Ni8mare vulnerability allows attackers to execute certain form-based workflows to gain access to files on the underlying server.
First reported: 07.01.2026 19:412 sources, 5 articlesShow sources
- Max severity Ni8mare flaw lets hackers hijack n8n servers — www.bleepingcomputer.com — 07.01.2026 19:41
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The vulnerability is a content-type confusion in the way n8n parses data, allowing attackers to bypass the upload parser and control file metadata, including the file path.
First reported: 07.01.2026 19:412 sources, 5 articlesShow sources
- Max severity Ni8mare flaw lets hackers hijack n8n servers — www.bleepingcomputer.com — 07.01.2026 19:41
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The flaw can be exploited to read arbitrary files from an n8n instance, exposing secrets and sensitive information.
First reported: 07.01.2026 19:412 sources, 5 articlesShow sources
- Max severity Ni8mare flaw lets hackers hijack n8n servers — www.bleepingcomputer.com — 07.01.2026 19:41
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
Cyera researchers discovered the Ni8mare vulnerability and reported it to n8n on November 9, 2025.
First reported: 07.01.2026 19:412 sources, 5 articlesShow sources
- Max severity Ni8mare flaw lets hackers hijack n8n servers — www.bleepingcomputer.com — 07.01.2026 19:41
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
There is no official workaround for Ni8mare, but mitigations include restricting or disabling publicly accessible webhook and form endpoints.
First reported: 07.01.2026 19:412 sources, 5 articlesShow sources
- Max severity Ni8mare flaw lets hackers hijack n8n servers — www.bleepingcomputer.com — 07.01.2026 19:41
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The recommended action is to update to n8n version 1.121.0 or a more recent version.
First reported: 07.01.2026 19:413 sources, 7 articlesShow sources
- Max severity Ni8mare flaw lets hackers hijack n8n servers — www.bleepingcomputer.com — 07.01.2026 19:41
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution — thehackernews.com — 28.01.2026 14:43
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover — www.infosecurity-magazine.com — 04.02.2026 15:00
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The Ni8mare vulnerability affects over 100,000 servers potentially exposed.
First reported: 08.01.2026 12:003 sources, 6 articlesShow sources
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution — thehackernews.com — 28.01.2026 14:43
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover — www.infosecurity-magazine.com — 04.02.2026 15:00
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The vulnerability could enable attackers to access API credentials, OAuth tokens, database connections, and cloud storage.
First reported: 08.01.2026 12:002 sources, 5 articlesShow sources
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover — www.infosecurity-magazine.com — 04.02.2026 15:00
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The vulnerability is related to the webhooks that start workflows in n8n.
First reported: 08.01.2026 12:002 sources, 4 articlesShow sources
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The platform parses incoming data based on the 'content-type' header in a webhook.
First reported: 08.01.2026 12:002 sources, 5 articlesShow sources
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover — www.infosecurity-magazine.com — 04.02.2026 15:00
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
When a request is 'multipart/form-data', the platform uses a special file upload parser (Formidable) which stores the files in temporary locations.
First reported: 08.01.2026 12:002 sources, 5 articlesShow sources
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover — www.infosecurity-magazine.com — 04.02.2026 15:00
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
For all other content types, a regular parser is used.
First reported: 08.01.2026 12:002 sources, 4 articlesShow sources
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The file upload parser wraps Formidable's parse() function, populating req.body.files with the output from Formidable.
First reported: 08.01.2026 12:002 sources, 4 articlesShow sources
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
If a threat actor changes the content type to something like application/json, the n8n middleware would call the regular parser instead of the special file upload parser.
First reported: 08.01.2026 12:002 sources, 4 articlesShow sources
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
This means req.body.files wouldn't be populated, allowing attackers to control the file metadata and file path.
First reported: 08.01.2026 12:002 sources, 5 articlesShow sources
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover — www.infosecurity-magazine.com — 04.02.2026 15:00
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The vulnerability was reported on November 9 and fixed nine days later.
First reported: 08.01.2026 12:002 sources, 4 articlesShow sources
- Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers — www.infosecurity-magazine.com — 08.01.2026 12:00
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
Over 105,753 unpatched instances of n8n were found exposed online, with 59,558 still exposed on Sunday.
First reported: 12.01.2026 16:051 source, 3 articlesShow sources
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
More than 28,000 IPs were found in the United States and over 21,000 in Europe.
First reported: 12.01.2026 16:051 source, 3 articlesShow sources
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
n8n is widely used in AI development to automate data ingestion and build AI agents and RAG pipelines.
First reported: 12.01.2026 16:051 source, 3 articlesShow sources
- Max severity Ni8mare flaw impacts nearly 60,000 n8n instances — www.bleepingcomputer.com — 12.01.2026 16:05
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
CVE-2026-1470 (CVSS score: 9.9) is an eval injection vulnerability that could allow an authenticated user to bypass the Expression sandbox mechanism and achieve full remote code execution on n8n's main node by passing specially crafted JavaScript code.
First reported: 28.01.2026 14:432 sources, 3 articlesShow sources
- Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution — thehackernews.com — 28.01.2026 14:43
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
CVE-2026-0863 (CVSS score: 8.5) is an eval injection vulnerability that could allow an authenticated user to bypass n8n's python-task-executor sandbox restrictions and run arbitrary Python code on the underlying operating system.
First reported: 28.01.2026 14:432 sources, 3 articlesShow sources
- Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution — thehackernews.com — 28.01.2026 14:43
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
Successful exploitation of CVE-2026-1470 and CVE-2026-0863 could permit an attacker to hijack an entire n8n instance, including under scenarios where it's operating under 'internal' execution mode.
First reported: 28.01.2026 14:432 sources, 3 articlesShow sources
- Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution — thehackernews.com — 28.01.2026 14:43
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
To address CVE-2026-1470, users are advised to update to versions 1.123.17, 2.4.5, or 2.5.1.
First reported: 28.01.2026 14:433 sources, 4 articlesShow sources
- Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution — thehackernews.com — 28.01.2026 14:43
- Critical and High Severity n8n Sandbox Flaws Allow RCE — www.infosecurity-magazine.com — 28.01.2026 18:00
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
To address CVE-2026-0863, users are advised to update to versions 1.123.14, 2.3.5, or 2.4.2.
First reported: 28.01.2026 14:433 sources, 4 articlesShow sources
- Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution — thehackernews.com — 28.01.2026 14:43
- Critical and High Severity n8n Sandbox Flaws Allow RCE — www.infosecurity-magazine.com — 28.01.2026 18:00
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The vulnerabilities highlight the difficulty in safely sandboxing dynamic, high-level languages such as JavaScript and Python.
First reported: 28.01.2026 14:433 sources, 4 articlesShow sources
- Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution — thehackernews.com — 28.01.2026 14:43
- Critical and High Severity n8n Sandbox Flaws Allow RCE — www.infosecurity-magazine.com — 28.01.2026 18:00
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
Deprecated or rarely used constructs, combined with interpreter changes and exception handling behavior, were enough to break out of otherwise restrictive sandboxes and achieve remote code execution.
First reported: 28.01.2026 14:433 sources, 4 articlesShow sources
- Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution — thehackernews.com — 28.01.2026 14:43
- Critical and High Severity n8n Sandbox Flaws Allow RCE — www.infosecurity-magazine.com — 28.01.2026 18:00
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The vulnerabilities were disclosed by the JFrog Security Research team.
First reported: 28.01.2026 18:002 sources, 3 articlesShow sources
- Critical and High Severity n8n Sandbox Flaws Allow RCE — www.infosecurity-magazine.com — 28.01.2026 18:00
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The first flaw, tracked as CVE-2026-1470, affects n8n's JavaScript expression engine and is rated CVSS 3.1 score of 9.9 Critical.
First reported: 28.01.2026 18:002 sources, 3 articlesShow sources
- Critical and High Severity n8n Sandbox Flaws Allow RCE — www.infosecurity-magazine.com — 28.01.2026 18:00
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The second flaw, CVE-2026-0863, is rated 8.5 High and impacts Python execution in the Code node when running in 'Internal' mode.
First reported: 28.01.2026 18:002 sources, 3 articlesShow sources
- Critical and High Severity n8n Sandbox Flaws Allow RCE — www.infosecurity-magazine.com — 28.01.2026 18:00
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The JavaScript issue involves the manipulation of the with statement to indirectly access the Function constructor and execute arbitrary code.
First reported: 28.01.2026 18:002 sources, 3 articlesShow sources
- Critical and High Severity n8n Sandbox Flaws Allow RCE — www.infosecurity-magazine.com — 28.01.2026 18:00
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The Python flaw involves the use of string formatting and changes introduced in Python 3.10 to recover restricted objects through exception handling.
First reported: 28.01.2026 18:002 sources, 3 articlesShow sources
- Critical and High Severity n8n Sandbox Flaws Allow RCE — www.infosecurity-magazine.com — 28.01.2026 18:00
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The vulnerabilities allow attackers to execute commands in the context of the main n8n service, potentially exposing environment variables, sensitive data, and system-level access.
First reported: 28.01.2026 18:002 sources, 3 articlesShow sources
- Critical and High Severity n8n Sandbox Flaws Allow RCE — www.infosecurity-magazine.com — 28.01.2026 18:00
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
CVE-2026-1470 is an AST sandbox escape caused by improper handling of the JavaScript with statement, allowing arbitrary JavaScript execution and full RCE on the main n8n node.
First reported: 28.01.2026 19:461 source, 2 articlesShow sources
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
CVE-2026-0863 is a Python AST sandbox escape that combines format-string-based object introspection with Python 3.10+ AttributeError.obj behavior to regain access to restricted builtins and imports, allowing execution of OS commands and full RCE when Python runs as a subprocess on the main n8n node.
First reported: 28.01.2026 19:461 source, 2 articlesShow sources
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
CVE-2026-1470 was fixed in versions 1.123.17, 2.4.5, and 2.5.1.
First reported: 28.01.2026 19:461 source, 2 articlesShow sources
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
CVE-2026-0863 was addressed in n8n versions 1.123.14, 2.3.5, 2.4.2.
First reported: 28.01.2026 19:461 source, 2 articlesShow sources
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The n8n cloud platform has addressed the issues, and only self-hosted versions running a vulnerable release are affected.
First reported: 28.01.2026 19:462 sources, 3 articlesShow sources
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover — www.infosecurity-magazine.com — 04.02.2026 15:00
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
Researcher Rhoda Smart promised to add a proof-of-concept exploit in a technical blog post, which could prompt attackers to hunt for and target self-hosted n8n deployments.
First reported: 28.01.2026 19:461 source, 2 articlesShow sources
- New sandbox escape flaw exposes n8n instances to RCE attacks — www.bleepingcomputer.com — 28.01.2026 19:46
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
Two maximum severity vulnerabilities (CVSS score of 10.0) in n8n were discovered by Pillar Security.
First reported: 04.02.2026 15:002 sources, 2 articlesShow sources
- Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover — www.infosecurity-magazine.com — 04.02.2026 15:00
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The vulnerabilities allow authenticated users to achieve complete server control and steal stored credentials, including API keys, cloud provider keys, database passwords, and OAuth tokens.
First reported: 04.02.2026 15:002 sources, 2 articlesShow sources
- Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover — www.infosecurity-magazine.com — 04.02.2026 15:00
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The first flaw was reported by Pillar Security to n8n maintainers, who released a patch, but a second vulnerability bypassing the fix was discovered 24 hours after the initial patch was deployed.
First reported: 04.02.2026 15:002 sources, 2 articlesShow sources
- Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover — www.infosecurity-magazine.com — 04.02.2026 15:00
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
n8n released a new patched version, version 2.4.0, with fixes for both vulnerabilities, in January 2026.
First reported: 04.02.2026 15:002 sources, 2 articlesShow sources
- Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover — www.infosecurity-magazine.com — 04.02.2026 15:00
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The Pillar Security advisory addressing both flaws has a GitHub vulnerability identifier, GHSA-6cqr-8cfr-67f8, but the CVE identifier for either of the vulnerabilities was not revealed.
First reported: 04.02.2026 15:002 sources, 2 articlesShow sources
- Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover — www.infosecurity-magazine.com — 04.02.2026 15:00
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
Companies using n8n for AI orchestration face credential exposure when using OpenAI, Anthropic, Azure OpenAI, and Hugging Face as well as vector database access (e.g., Pinecone, Weaviate, Qdrant).
First reported: 04.02.2026 15:002 sources, 2 articlesShow sources
- Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover — www.infosecurity-magazine.com — 04.02.2026 15:00
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
Attackers who exploit these flaws can intercept AI prompts, modify AI responses, redirect traffic through attacker-controlled endpoints, and exfiltrate sensitive data from AI interactions.
First reported: 04.02.2026 15:002 sources, 2 articlesShow sources
- Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover — www.infosecurity-magazine.com — 04.02.2026 15:00
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
On n8n cloud, a single compromised user could potentially access shared infrastructure and other customers' data within the Kubernetes cluster.
First reported: 04.02.2026 15:002 sources, 2 articlesShow sources
- Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover — www.infosecurity-magazine.com — 04.02.2026 15:00
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
Pillar Security recommended upgrading to n8n version 2.4.0 or later, rotating the encryption key and all credentials, auditing workflows, and monitoring AI workflows for unusual patterns.
First reported: 04.02.2026 15:002 sources, 2 articlesShow sources
- Two Critical Flaws in n8n AI Workflow Automation Platform Allow Complete Takeover — www.infosecurity-magazine.com — 04.02.2026 15:00
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The vulnerabilities are collectively tracked as CVE-2026-25049.
First reported: 04.02.2026 23:142 sources, 2 articlesShow sources
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
- Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows — thehackernews.com — 05.02.2026 08:16
-
The issues stem from n8n's sanitization mechanism and bypass the patch for CVE-2025-68613.
First reported: 04.02.2026 23:142 sources, 2 articlesShow sources
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
- Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows — thehackernews.com — 05.02.2026 08:16
-
Exploiting CVE-2026-25049 enables complete compromise of the n8n instance and could be leveraged to run arbitrary system commands on the server, steal all stored credentials, secrets (API keys, OAuth tokens), and sensitive configuration files.
First reported: 04.02.2026 23:142 sources, 2 articlesShow sources
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
- Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows — thehackernews.com — 05.02.2026 08:16
-
Researchers at Pillar Security demonstrated a chained bypass to the n8n team, allowing sandbox escape and access to the Node.js global object, leading to RCE.
First reported: 04.02.2026 23:141 source, 1 articleShow sources
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
A fix was implemented two days later, but upon further analysis, Pillar found it incomplete, and a second escape via a different mechanism using equivalent operations remained possible.
First reported: 04.02.2026 23:142 sources, 2 articlesShow sources
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
- Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows — thehackernews.com — 05.02.2026 08:16
-
n8n developers confirmed the bypass on December 30, and eventually, n8n released version 2.4.0 on January 12, 2026, addressing the issue.
First reported: 04.02.2026 23:142 sources, 2 articlesShow sources
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
- Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows — thehackernews.com — 05.02.2026 08:16
-
Researchers at Endor Labs also discovered sanitization bypasses and demonstrated the CVE-2026-25049 vulnerability with a simple proof-of-concept (PoC) exploit that achieves remote code execution.
First reported: 04.02.2026 23:142 sources, 2 articlesShow sources
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
- Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows — thehackernews.com — 05.02.2026 08:16
-
In all versions prior to 2.5.2 and 1.123.17, the sanitization function assumes keys in property accesses are strings in attacker-controlled code.
First reported: 04.02.2026 23:142 sources, 2 articlesShow sources
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
- Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows — thehackernews.com — 05.02.2026 08:16
-
Researchers at SecureLayer7 provide the technical details that enabled them to achieve "server side JavaScript execution using the Function constructor."
First reported: 04.02.2026 23:142 sources, 2 articlesShow sources
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
- Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows — thehackernews.com — 05.02.2026 08:16
-
SecureLayer7's report also includes a PoC exploit and detailed steps for the initial setup and creating a malicious workflow that leads to full server control.
First reported: 04.02.2026 23:142 sources, 2 articlesShow sources
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
- Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows — thehackernews.com — 05.02.2026 08:16
-
Currently, there have not been any public reports about CVE-2026-25049 being exploited.
First reported: 04.02.2026 23:141 source, 1 articleShow sources
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
GreyNoise reported seeing potentially malicious activity targeting exposed n8n endpoints vulnerable to Ni8mare, logging at least 33,000 requests between January 27 and February 3.
First reported: 04.02.2026 23:141 source, 1 articleShow sources
- Critical n8n flaws disclosed along with public exploits — www.bleepingcomputer.com — 04.02.2026 23:14
-
The vulnerability CVE-2026-25049 has a CVSS score of 9.4, not 10.0 as previously implied in some sources.
First reported: 05.02.2026 08:161 source, 1 articleShow sources
- Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows — thehackernews.com — 05.02.2026 08:16
-
The flaw allows authenticated users with workflow creation/modification permissions to execute unintended system commands via crafted expressions in workflow parameters.
First reported: 05.02.2026 08:161 source, 1 articleShow sources
- Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows — thehackernews.com — 05.02.2026 08:16
-
The issue stems from a mismatch between TypeScript's compile-time type system and JavaScript's runtime behavior, enabling attackers to bypass sanitization checks by passing non-string values (e.g., objects, arrays, symbols).
First reported: 05.02.2026 08:161 source, 1 articleShow sources
- Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows — thehackernews.com — 05.02.2026 08:16
-
SecureLayer7 demonstrated that an attacker can create a workflow with a public webhook and use destructuring syntax in JavaScript to execute system-level commands remotely.
First reported: 05.02.2026 08:161 source, 1 articleShow sources
- Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows — thehackernews.com — 05.02.2026 08:16
-
The vulnerability affects n8n versions <1.123.17 and <2.5.2, with fixes released in versions 1.123.17 and 2.5.2.
First reported: 05.02.2026 08:161 source, 1 articleShow sources
- Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows — thehackernews.com — 05.02.2026 08:16
-
Ten security researchers, including Fatih Çelik, Cris Staicu, Eilon Cohen, and Sandeep Kamble, are credited with discovering and reporting the vulnerability.
First reported: 05.02.2026 08:161 source, 1 articleShow sources
- Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows — thehackernews.com — 05.02.2026 08:16
-
Endor Labs highlighted that TypeScript's type checks are insufficient for runtime attacker-produced values, emphasizing the need for additional runtime validation layers.
First reported: 05.02.2026 08:161 source, 1 articleShow sources
- Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows — thehackernews.com — 05.02.2026 08:16
-
The vulnerability significantly escalates risk when combined with n8n's webhook feature, allowing remote command execution via publicly accessible workflows.
First reported: 05.02.2026 08:161 source, 1 articleShow sources
- Critical n8n Flaw CVE-2026-25049 Enables System Command Execution via Malicious Workflows — thehackernews.com — 05.02.2026 08:16
Similar Happenings
Metro4Shell RCE Flaw Exploited in React Native CLI npm Package
Threat actors are actively exploiting a critical remote code execution (RCE) flaw (CVE-2025-11953, CVSS 9.8) in the Metro Development Server within the @react-native-community/cli npm package. First observed on December 21, 2025, the vulnerability allows unauthenticated attackers to execute arbitrary OS commands. Exploits deliver a PowerShell script that disables Microsoft Defender exclusions and downloads a Rust-based binary with anti-analysis features from an attacker-controlled host. The attacks originate from multiple IP addresses and indicate operational use rather than experimental probing.
OpenClaw Token Exfiltration Vulnerability Enables One-Click RCE
A high-severity vulnerability (CVE-2026-25253, CVSS 8.8) in OpenClaw, an open-source AI assistant, allows remote code execution via a malicious link. The flaw enables token exfiltration and full gateway compromise. The issue was patched in version 2026.1.29 released on January 30, 2026. The vulnerability arises because the Control UI trusts the gatewayUrl parameter without validation, auto-connecting and sending the stored gateway token in the WebSocket connect payload. This allows an attacker to connect to the victim's local gateway, modify configurations, and execute privileged actions. OpenClaw integrates with various messaging platforms and has gained rapid popularity, with its GitHub repository crossing 149,000 stars. The vulnerability can be exploited to achieve one-click RCE by visiting a malicious web page, leveraging cross-site WebSocket hijacking due to the lack of origin header validation.
OpenClaw AI Agent Security Concerns in Business Environments
OpenClaw, an open-source AI agent formerly known as MoltBot and ClawdBot, has rapidly gained popularity on GitHub, raising significant security concerns due to its extensive access to user systems and data. The AI agent can execute commands, manage files, and interact with various platforms, posing risks such as prompt injection and unauthorized access. Despite its growth, security experts warn about the dangers of integrating such AI agents into corporate environments without proper safeguards. The project has seen a 14-fold increase in adoption within a week, with over 113,000 stars on GitHub. However, its rapid development and extensive access capabilities have led to concerns about potential data breaches and supply chain risks. Experts emphasize the need for better security practices to mitigate these risks.
Critical sandbox escape flaw in vm2 NodeJS library
A critical-severity vulnerability (CVE-2026-22709) in the vm2 Node.js sandbox library allows escaping the sandbox and executing arbitrary code on the host system. The flaw arises from improper sanitization of Promises, enabling attackers to bypass sandbox restrictions. The vulnerability affects versions prior to 3.10.2 and has been partially addressed in subsequent updates. The vm2 library, widely used in SaaS platforms and open-source projects, was discontinued in 2023 due to repeated sandbox-escape vulnerabilities but was resurrected in 2025. The vulnerability is trivial to exploit, and users are advised to upgrade to the latest version (3.10.3) to mitigate the risk. The vulnerability carries a CVSS score of 9.8 out of 10.0, highlighting its criticality. The maintainer has acknowledged that new bypasses will likely be discovered in the future, urging users to keep the library up to date and consider alternatives like isolated-vm for stronger isolation guarantees.
Chainlit Framework Vulnerabilities Expose AI Application Infrastructure
Two high-severity vulnerabilities in the Chainlit framework, tracked as CVE-2026-22218 and CVE-2026-22219, allow authenticated users to read arbitrary files and perform server-side request forgery (SSRF), potentially exposing sensitive data and cloud resources. These vulnerabilities, collectively dubbed ChainLeak by Zafran Security, were responsibly disclosed on November 23, 2025, and patched on December 24, 2025, with the release of Chainlit version 2.9.4. Chainlit, widely used for building conversational AI applications, has seen significant adoption with over 7.3 million downloads to date, including 220,000 in the past week alone. The vulnerabilities highlight the risks posed by traditional web flaws in AI application environments, particularly in enterprise deployments and academic institutions.