• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution

You are here: Home / General Cyber Security News / Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
January 28, 2026

Cybersecurity researchers have disclosed two new security flaws in the n8n workflow automation platform, including a crucial vulnerability that could result in remote code execution.

The weaknesses, discovered by the JFrog Security Research team, are listed below –

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


  • CVE-2026-1470 (CVSS score: 9.9) – An eval injection vulnerability that could allow an authenticated user to bypass the Expression sandbox mechanism and achieve full remote code execution on n8n’s main node by passing specially crafted JavaScript code
  • CVE-2026-0863 (CVSS score: 8.5) – An eval injection vulnerability that could allow an authenticated user to bypass n8n’s python-task-executor sandbox restrictions and run arbitrary Python code on the underlying operating system

Successful exploitation of the flaws could permit an attacker to hijack an entire n8n instance, including under scenarios where it’s operating under “internal” execution mode. In its documentation, n8n notes that using internal mode in production environments can pose a security risk, urging users to switch to external mode to ensure proper isolation between n8n and task runner processes.

Cybersecurity

“As n8n spans an entire organization to automate AI workflows, it holds the keys to core tools, functions, and data from infrastructure, including LLM APIs, sales data, and internal IAM systems, among others,” JFrog said in a statement shared with The Hacker News. “This results in escapes giving a hacker an effective “skeleton key” to the entire corporation.”

To address the flaws, users are advised to update to the following versions –

  • CVE-2026-1470 – 1.123.17, 2.4.5, or 2.5.1
  • CVE-2026-0863 – 1.123.14, 2.3.5, or 2.4.2

The development comes merely weeks after Cyera Research Labs detailed a maximum-severity security flaw in n8n (CVE-2026-21858 aka Ni8mare) that allows an unauthenticated remote attacker to gain complete control over susceptible instances.

“These vulnerabilities highlight how difficult it is to safely sandbox dynamic, high‑level languages such as JavaScript and Python,” researcher Nathan Nehorai said. “Even with multiple validation layers, deny lists, and AST‑based controls in place, subtle language features and runtime behaviors can be leveraged to bypass security assumptions.”

“In this case, deprecated or rarely used constructs, combined with interpreter changes and exception handling behavior, were enough to break out of otherwise restrictive sandboxes and achieve remote code execution.”

Found this article interesting? Follow us on Google News, Twitter and LinkedIn to read more exclusive content we post.


Some parts of this article are sourced from:
thehackernews.com

Previous Post: «from triage to threat hunts: how ai accelerates secops From Triage to Threat Hunts: How AI Accelerates SecOps

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
  • From Triage to Threat Hunts: How AI Accelerates SecOps
  • Mustang Panda Deploys Updated COOLCLIENT Backdoor in Government Cyber Attacks
  • Password Reuse in Disguise: An Often-Missed Risky Workaround
  • Google Warns of Active Exploitation of WinRAR Vulnerability CVE-2025-8088
  • Fake Python Spellchecker Packages on PyPI Delivered Hidden Remote Access Trojan
  • Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected
  • WhatsApp Rolls Out Lockdown-Style Security Mode to Protect Targeted Users From Spyware
  • Experts Detect Pakistan-Linked Cyber Campaigns Aimed at Indian Government Entities
  • ClickFix Attacks Expand Using Fake CAPTCHAs, Microsoft Scripts, and Trusted Web Services

Copyright © TheCyberSecurity.News, All Rights Reserved.