Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Vulnerability in n8n Poses Server Risks

Critical Vulnerability in n8n Poses Server Risks

Posted on February 5, 2026 By CWS

A significant security flaw within the n8n AI workflow automation platform has been identified, potentially allowing unauthorized command execution on servers. According to Pillar Security, this vulnerability, classified as CVE-2026-25049 and rated with a CVSS score of 9.4, affects how JavaScript expressions are evaluated in the n8n sandbox’s sanitization routine.

Details of the Vulnerability

The vulnerability arises from the n8n sandbox’s insufficient sanitization of JavaScript expressions. Pillar Security discovered that by using properties with template literals, arrow functions, and specific stack frame objects, the sandbox’s security measures could be circumvented, granting unauthorized command execution capabilities on the server.

This breach led to full server compromise, granting attackers access to sensitive information such as environment variables, stored credentials, API keys, OAuth tokens, and configuration files. With these compromised secrets, attackers could infiltrate connected cloud accounts, redirect AI pipelines, and access internal services on n8n cloud instances.

Attack Methodology

Pillar Security detailed that an attack could be initiated by crafting or altering a workflow with parameters containing specific expressions. Interestingly, the attack requires no special permissions or administrative access, merely a user capable of editing workflows.

After reporting the vulnerability to n8n on December 21, a fix was implemented two days later to block template literals. However, Pillar Security quickly identified that the patch could be bypassed using unsanitized function arguments, revealing the underlying issue of incomplete Abstract Syntax Tree (AST) analysis.

Resolution and Recommendations

Both the original vulnerability and the bypass were addressed in n8n version 2.4.0. Users are strongly advised to update their systems immediately to mitigate any associated risks.

The incident underscores the importance of robust security practices and thorough code analysis in preventing similar vulnerabilities. As the cybersecurity landscape evolves, staying informed and proactive in updating systems is crucial for maintaining security.

For further information on related security updates, refer to recent patches for Cisco, F5, Chrome, Firefox, and jsPDF, which address high-severity vulnerabilities.

Security Week News Tags:cloud security, CVE-2026-25049, Cybersecurity, JavaScript, n8n, Pillar Security, remote code execution, sandbox escape, Security, Server, Vulnerability, workflow automation

Post navigation

Previous Post: Avoid Fake Traffic Ticket Sites Stealing Your Data
Next Post: Windows 11 to Integrate Sysmon for Enhanced Security

Related Posts

Microsoft Disables Downloaded File Previews to Block NTLM Hash Leaks Microsoft Disables Downloaded File Previews to Block NTLM Hash Leaks Security Week News
Over 73,000 WatchGuard Firebox Devices Impacted by Recent Critical Flaw Over 73,000 WatchGuard Firebox Devices Impacted by Recent Critical Flaw Security Week News
Cyberattack Unlikely in Communications Failure That Grounded Flights in Greece Cyberattack Unlikely in Communications Failure That Grounded Flights in Greece Security Week News
Ransomware Payments Dropped in Q3 2025: Analysis Ransomware Payments Dropped in Q3 2025: Analysis Security Week News
CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor  CISA Warns of Flaw in TeleMessage App Used by Ex-National Security Advisor  Security Week News
US Sanctions Myanmar Militia Involved in Cyber Scams  US Sanctions Myanmar Militia Involved in Cyber Scams  Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Iranian Infy Hackers Reactivate C2 Servers After Internet Blackout
  • Cyberattackers Penetrate Networks Using SonicWall SSLVPN Credentials
  • Nullify Gains $12.5M to Enhance AI Cybersecurity Solutions
  • Guide to Managing AI Usage in Enterprises
  • Windows 11 to Integrate Sysmon for Enhanced Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Iranian Infy Hackers Reactivate C2 Servers After Internet Blackout
  • Cyberattackers Penetrate Networks Using SonicWall SSLVPN Credentials
  • Nullify Gains $12.5M to Enhance AI Cybersecurity Solutions
  • Guide to Managing AI Usage in Enterprises
  • Windows 11 to Integrate Sysmon for Enhanced Security

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark