Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical n8n Vulnerabilities Risk Remote Code Execution

Critical n8n Vulnerabilities Risk Remote Code Execution

Posted on March 11, 2026 By CWS

Cybersecurity researchers have recently identified and disclosed serious security vulnerabilities within the n8n workflow automation platform. These flaws, now addressed, posed significant risks, enabling arbitrary command execution. Among the critical vulnerabilities are CVE-2026-27577 and CVE-2026-27493, both of which have been assigned high CVSS scores of 9.4 and 9.5, respectively.

Details of the Critical Vulnerabilities

CVE-2026-27577 involves a sandbox escape in the expression compiler, as discovered by Eilon Cohen from Pillar Security. This flaw allowed for remote code execution due to a missing transformation in the AST rewriter, enabling authenticated expressions to bypass restrictions. Meanwhile, CVE-2026-27493, identified as a double-evaluation bug, could be exploited using n8n’s Form nodes for expression injection without requiring authentication or an n8n account.

Both vulnerabilities affected several versions of n8n, including those before 1.123.22 and specific versions in the 2.x series. Users are advised to upgrade to versions 2.10.1, 2.9.3, or 1.123.22 to ensure protection against these threats.

Mitigation Strategies and Recommendations

For CVE-2026-27577, n8n suggests restricting workflow creation and editing permissions to trusted users and deploying the platform in secure environments with limited OS permissions and network access. As a temporary measure against CVE-2026-27493, manually reviewing form nodes and disabling specific nodes through environment variables are recommended actions.

These vulnerabilities could potentially allow attackers to access the N8N_ENCRYPTION_KEY, leading to the decryption of sensitive stored credentials, such as AWS keys and database passwords. To mitigate these risks, n8n urges users to apply the recommended patches promptly.

Additional Security Concerns

Furthermore, n8n has patched two additional vulnerabilities—CVE-2026-27495 and CVE-2026-27497. Both involve code execution risks, with the former affecting the JavaScript Task Runner sandbox and the latter involving SQL queries within the Merge node. Suggested workarounds include using the external runner mode and disabling the Merge node through environment variables.

While there is no evidence of these vulnerabilities being exploited in the wild, maintaining updated installations is crucial for users to safeguard their systems from potential breaches.

In conclusion, addressing these security flaws promptly is essential to protecting sensitive data and ensuring the secure operation of the n8n platform. Users should follow the outlined mitigation strategies and keep their systems updated to mitigate potential risks effectively.

The Hacker News Tags:CVE, Cybersecurity, data breach, n8n, Patch, remote code execution, security flaws, software update, Vulnerability, workflow automation

Post navigation

Previous Post: Critical Vulnerability in Active Directory Services Resolved
Next Post: Stryker Hit by Major Cyberattack Linked to Iran

Related Posts

Mesh CSMA: Breaking Attack Paths to Sensitive Data Mesh CSMA: Breaking Attack Paths to Sensitive Data The Hacker News
Masjesu Botnet: Global Threat to IoT Devices Masjesu Botnet: Global Threat to IoT Devices The Hacker News
Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability Google Issues Security Fix for Actively Exploited Chrome V8 Zero-Day Vulnerability The Hacker News
Addressing Security Risks of Unregulated AI in Businesses Addressing Security Risks of Unregulated AI in Businesses The Hacker News
Google Warns of Scattered Spider Attacks Targeting IT Support Teams at U.S. Insurance Firms Google Warns of Scattered Spider Attacks Targeting IT Support Teams at U.S. Insurance Firms The Hacker News
Checkmarx Data Breach: GitHub Data Exposed on Dark Web Checkmarx Data Breach: GitHub Data Exposed on Dark Web The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • AI Agent Deletes Database in Seconds: Security Alert
  • North Korean Hackers Target Pharma Firms with Malware
  • EU Pushes Google to Share Anonymized User Data
  • Google Patches Critical Gemini CLI Vulnerability
  • ClickUp’s API Key Leak Exposes Fortune 500 Emails

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • AI Agent Deletes Database in Seconds: Security Alert
  • North Korean Hackers Target Pharma Firms with Malware
  • EU Pushes Google to Share Anonymized User Data
  • Google Patches Critical Gemini CLI Vulnerability
  • ClickUp’s API Key Leak Exposes Fortune 500 Emails

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark