Close Menu
  • Home
  • Opinion
  • Region
    • Africa
    • Asia
    • Europe
    • Middle East
    • North America
    • Oceania
    • South America
  • AI & Machine Learning
  • Robotics & Automation
  • Space & Deep Tech
  • Web3 & Digital Economies
  • Climate & Sustainability Tech
  • Biotech & Future Health
  • Mobility & Smart Cities
  • Global Tech Pulse
  • Cybersecurity & Digital Rights
  • Future of Work & Education
  • Trend Radar & Startup Watch
  • Creator Economy & Culture
What's Hot

Apple Mac Professional’s Journey Ends After Two Many years of Evolution and Stagnation

March 29, 2026

Google-Agent vs Googlebot: Google Defines the Technical Boundary Between Consumer Triggered AI Entry and Search Crawling Methods In the present day

March 29, 2026

Effectivity, inclusion, AI: check your online business creativity with Version 225 of our weekly quiz!

March 29, 2026
Facebook X (Twitter) Instagram LinkedIn RSS
NextTech NewsNextTech News
Facebook X (Twitter) Instagram LinkedIn RSS
  • Home
  • Africa
  • Asia
  • Europe
  • Middle East
  • North America
  • Oceania
  • South America
  • Opinion
Trending
  • Apple Mac Professional’s Journey Ends After Two Many years of Evolution and Stagnation
  • Google-Agent vs Googlebot: Google Defines the Technical Boundary Between Consumer Triggered AI Entry and Search Crawling Methods In the present day
  • Effectivity, inclusion, AI: check your online business creativity with Version 225 of our weekly quiz!
  • Meta lays off lots of amid pivot from metaverse to AI
  • Fascinating Look Again at BlackBerry’s PlayBook, the Compact Pill From 2011 That Had Actual Promise
  • New York Metropolis program goals to fast-track inexpensive housing on city-owned land
  • Alibaba’s Qwen Built-in into Hongqi Good Cockpit for In-Automobile AI Providers
  • Ajman Transport steps up security measures amid antagonistic climate situations
Sunday, March 29
NextTech NewsNextTech News
Home - Cybersecurity & Digital Rights - Two Excessive-Severity n8n Flaws Permit Authenticated Distant Code Execution
Cybersecurity & Digital Rights

Two Excessive-Severity n8n Flaws Permit Authenticated Distant Code Execution

NextTechBy NextTechFebruary 1, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
Follow Us
Google News Flipboard
Two Excessive-Severity n8n Flaws Permit Authenticated Distant Code Execution
Share
Facebook Twitter LinkedIn Pinterest Email


Ravie LakshmananJan 28, 2026Vulnerability / Workflow Automation

Cybersecurity researchers have disclosed two new safety flaws within the n8n workflow automation platform, together with a vital vulnerability that might lead to distant code execution.

The weaknesses, found by the JFrog Safety Analysis workforce, are listed under –

  • CVE-2026-1470 (CVSS rating: 9.9) – An eval injection vulnerability that might permit an authenticated person to bypass the Expression sandbox mechanism and obtain full distant code execution on n8n’s most important node by passing specifically crafted JavaScript code
  • CVE-2026-0863 (CVSS rating: 8.5) – An eval injection vulnerability that might permit an authenticated person to bypass n8n’s python-task-executor sandbox restrictions and run arbitrary Python code on the underlying working system

Shachar Menashe, JFrog’s vice chairman of safety analysis, instructed The Hacker information that one of many causes for CVE-2026-1470’s excessive CVSS rating regardless of requiring authentication is that “any person of n8n can exploit this situation and achieve an entire takeover of all the n8n occasion, in order that makes it a bit extra harmful.”

Profitable exploitation of the failings may allow an attacker to hijack a whole n8n occasion, together with underneath situations the place it is working underneath “inside” execution mode. In its documentation, n8n notes that utilizing inside mode in manufacturing environments can pose a safety danger, urging customers to modify to exterior mode to make sure correct isolation between n8n and activity runner processes.

Cybersecurity

“As n8n spans a whole group to automate AI workflows, it holds the keys to core instruments, capabilities, and information from infrastructure, together with LLM APIs, gross sales information, and inside IAM programs, amongst others,” JFrog stated in a press release shared with The Hacker Information. “This ends in escapes giving a hacker an efficient “skeleton key” to all the company.”

To handle the failings, customers are suggested to replace to the next variations –

  • CVE-2026-1470 – 1.123.17, 2.4.5, or 2.5.1
  • CVE-2026-0863 – 1.123.14, 2.3.5, or 2.4.2

The event comes merely weeks after Cyera Analysis Labs detailed a maximum-severity safety flaw in n8n (CVE-2026-21858 aka Ni8mare) that permits an unauthenticated distant attacker to realize full management over prone cases. As of January 27, 2026, greater than 39,000 n8n cases stay prone to the flaw, per information from the Shadowserver Basis.

“These vulnerabilities spotlight how tough it’s to securely sandbox dynamic, excessive‑stage languages equivalent to JavaScript and Python,” researcher Nathan Nehorai stated. “Even with a number of validation layers, deny lists, and AST‑primarily based controls in place, refined language options and runtime behaviors will be leveraged to bypass safety assumptions.”

“On this case, deprecated or hardly ever used constructs, mixed with interpreter adjustments and exception dealing with conduct, have been sufficient to interrupt out of in any other case restrictive sandboxes and obtain distant code execution.”

Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the most recent breakthroughs, get unique updates, and join with a worldwide community of future-focused thinkers.
Unlock tomorrow’s traits as we speak: learn extra, subscribe to our e-newsletter, and change into a part of the NextTech neighborhood at NextTech-news.com

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
NextTech
  • Website

Related Posts

Citrix NetScaler Beneath Lively Recon for CVE-2026-3055 (CVSS 9.3) Reminiscence Overread Bug

March 29, 2026

RSAC 2026 wrap-up – Week in safety with Tony Anscombe

March 28, 2026

LangChain, LangGraph Flaws Expose Recordsdata, Secrets and techniques, Databases in Broadly Used AI Frameworks

March 28, 2026
Add A Comment
Leave A Reply Cancel Reply

Economy News

Apple Mac Professional’s Journey Ends After Two Many years of Evolution and Stagnation

By NextTechMarch 29, 2026

Apple has quietly pulled the Mac Professional from its on-line retailer, bringing an finish to…

Google-Agent vs Googlebot: Google Defines the Technical Boundary Between Consumer Triggered AI Entry and Search Crawling Methods In the present day

March 29, 2026

Effectivity, inclusion, AI: check your online business creativity with Version 225 of our weekly quiz!

March 29, 2026
Top Trending

Apple Mac Professional’s Journey Ends After Two Many years of Evolution and Stagnation

By NextTechMarch 29, 2026

Apple has quietly pulled the Mac Professional from its on-line retailer, bringing…

Google-Agent vs Googlebot: Google Defines the Technical Boundary Between Consumer Triggered AI Entry and Search Crawling Methods In the present day

By NextTechMarch 29, 2026

As Google integrates AI capabilities throughout its product suite, a brand new…

Effectivity, inclusion, AI: check your online business creativity with Version 225 of our weekly quiz!

By NextTechMarch 29, 2026

Lateral Sparks, the weekly quiz from YourStory, assessments your area information, enterprise…

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

NEXTTECH-LOGO
Facebook X (Twitter) Instagram YouTube

AI & Machine Learning

Robotics & Automation

Space & Deep Tech

Web3 & Digital Economies

Climate & Sustainability Tech

Biotech & Future Health

Mobility & Smart Cities

Global Tech Pulse

Cybersecurity & Digital Rights

Future of Work & Education

Creator Economy & Culture

Trend Radar & Startup Watch

News By Region

Africa

Asia

Europe

Middle East

North America

Oceania

South America

2025 © NextTech-News. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms Of Service
  • Advertise With Us
  • Write For Us
  • Submit Article & Press Release

Type above and press Enter to search. Press Esc to cancel.

Subscribe For Latest Updates

Sign up to best of Tech news, informed analysis and opinions on what matters to you.

Invalid email address
 We respect your inbox and never send spam. You can unsubscribe from our newsletter at any time.     
Thanks for subscribing!