Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
Briefly

Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
"CVE-2026-1470 (CVSS score: 9.9) - An eval injection vulnerability that could allow an authenticated user to bypass the Expression sandbox mechanism and achieve full remote code execution on n8n's main node by passing specially crafted JavaScript code CVE-2026-0863 (CVSS score: 8.5) - An eval injection vulnerability that could allow an authenticated user to bypass n8n's python-task-executor sandbox restrictions and run arbitrary Python code on the underlying operating system"
""As n8n spans an entire organization to automate AI workflows, it holds the keys to core tools, functions, and data from infrastructure, including LLM APIs, sales data, and internal IAM systems, among others," JFrog said in a statement shared with The Hacker News. "This results in escapes giving a hacker an effective "skeleton key" to the entire corporation." To address the flaws, users are advised to update to the following versions - CVE-2026-1470 - 1.123.17, 2.4.5, or 2.5.1 CVE-2026-0863 - 1.123.14, 2.3.5, or 2.4.2"
Two eval injection vulnerabilities in n8n enable authenticated users to bypass sandbox protections and execute arbitrary code. CVE-2026-1470 (CVSS 9.9) allows specially crafted JavaScript to escape the Expression sandbox and achieve remote code execution on n8n's main node. CVE-2026-0863 (CVSS 8.5) permits bypassing the python-task-executor sandbox to run arbitrary Python on the host. Successful exploitation can hijack entire n8n instances, including when running in internal execution mode. n8n documentation warns that internal mode poses production risks and recommends external mode for isolation. Fixed releases are provided and users should upgrade to the specified patched versions.
Read at The Hacker News
Unable to calculate read time
[
|
]