Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerability in n8n Poses Server Risks

Critical Vulnerability in n8n Poses Server Risks

Posted on February 5, 2026 By CWS

A significant security flaw within the n8n AI workflow automation platform has been identified, potentially allowing unauthorized command execution on servers. According to Pillar Security, this vulnerability, classified as CVE-2026-25049 and rated with a CVSS score of 9.4, affects how JavaScript expressions are evaluated in the n8n sandbox’s sanitization routine.

Details of the Vulnerability

The vulnerability arises from the n8n sandbox’s insufficient sanitization of JavaScript expressions. Pillar Security discovered that by using properties with template literals, arrow functions, and specific stack frame objects, the sandbox’s security measures could be circumvented, granting unauthorized command execution capabilities on the server.

This breach led to full server compromise, granting attackers access to sensitive information such as environment variables, stored credentials, API keys, OAuth tokens, and configuration files. With these compromised secrets, attackers could infiltrate connected cloud accounts, redirect AI pipelines, and access internal services on n8n cloud instances.

Attack Methodology

Pillar Security detailed that an attack could be initiated by crafting or altering a workflow with parameters containing specific expressions. Interestingly, the attack requires no special permissions or administrative access, merely a user capable of editing workflows.

After reporting the vulnerability to n8n on December 21, a fix was implemented two days later to block template literals. However, Pillar Security quickly identified that the patch could be bypassed using unsanitized function arguments, revealing the underlying issue of incomplete Abstract Syntax Tree (AST) analysis.

Resolution and Recommendations

Both the original vulnerability and the bypass were addressed in n8n version 2.4.0. Users are strongly advised to update their systems immediately to mitigate any associated risks.

The incident underscores the importance of robust security practices and thorough code analysis in preventing similar vulnerabilities. As the cybersecurity landscape evolves, staying informed and proactive in updating systems is crucial for maintaining security.

For further information on related security updates, refer to recent patches for Cisco, F5, Chrome, Firefox, and jsPDF, which address high-severity vulnerabilities.

Security Week News Tags:cloud security, CVE-2026-25049, Cybersecurity, JavaScript, n8n, Pillar Security, remote code execution, sandbox escape, Security, Server, Vulnerability, workflow automation

Post navigation

Previous Post: Avoid Fake Traffic Ticket Sites Stealing Your Data
Next Post: Windows 11 to Integrate Sysmon for Enhanced Security

Related Posts

437,000 Impacted by Ascension Health Data Breach 437,000 Impacted by Ascension Health Data Breach Security Week News
Signs of Concealed Information in Security Management Signs of Concealed Information in Security Management Security Week News
High-Severity Remote Code Execution Vulnerability Patched in OpenSSL High-Severity Remote Code Execution Vulnerability Patched in OpenSSL Security Week News
Project Eleven Raises  Million for Post-Quantum Security Project Eleven Raises $20 Million for Post-Quantum Security Security Week News
Two New Web Application Risk Categories Added to OWASP Top 10 Two New Web Application Risk Categories Added to OWASP Top 10 Security Week News
RapidFort Secures M to Enhance Software Security Automation RapidFort Secures $42M to Enhance Software Security Automation Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News