Cybersecurity researchers have disclosed two new safety flaws within the n8n workflow automation platform, together with a vital vulnerability that might lead to distant code execution.
The weaknesses, found by the JFrog Safety Analysis workforce, are listed under –
- CVE-2026-1470 (CVSS rating: 9.9) – An eval injection vulnerability that might permit an authenticated person to bypass the Expression sandbox mechanism and obtain full distant code execution on n8n’s most important node by passing specifically crafted JavaScript code
- CVE-2026-0863 (CVSS rating: 8.5) – An eval injection vulnerability that might permit an authenticated person to bypass n8n’s python-task-executor sandbox restrictions and run arbitrary Python code on the underlying working system
Shachar Menashe, JFrog’s vice chairman of safety analysis, instructed The Hacker information that one of many causes for CVE-2026-1470’s excessive CVSS rating regardless of requiring authentication is that “any person of n8n can exploit this situation and achieve an entire takeover of all the n8n occasion, in order that makes it a bit extra harmful.”
Profitable exploitation of the failings may allow an attacker to hijack a whole n8n occasion, together with underneath situations the place it is working underneath “inside” execution mode. In its documentation, n8n notes that utilizing inside mode in manufacturing environments can pose a safety danger, urging customers to modify to exterior mode to make sure correct isolation between n8n and activity runner processes.

“As n8n spans a whole group to automate AI workflows, it holds the keys to core instruments, capabilities, and information from infrastructure, together with LLM APIs, gross sales information, and inside IAM programs, amongst others,” JFrog stated in a press release shared with The Hacker Information. “This ends in escapes giving a hacker an efficient “skeleton key” to all the company.”
To handle the failings, customers are suggested to replace to the next variations –
- CVE-2026-1470 – 1.123.17, 2.4.5, or 2.5.1
- CVE-2026-0863 – 1.123.14, 2.3.5, or 2.4.2
The event comes merely weeks after Cyera Analysis Labs detailed a maximum-severity safety flaw in n8n (CVE-2026-21858 aka Ni8mare) that permits an unauthenticated distant attacker to realize full management over prone cases. As of January 27, 2026, greater than 39,000 n8n cases stay prone to the flaw, per information from the Shadowserver Basis.
“These vulnerabilities spotlight how tough it’s to securely sandbox dynamic, excessive‑stage languages equivalent to JavaScript and Python,” researcher Nathan Nehorai stated. “Even with a number of validation layers, deny lists, and AST‑primarily based controls in place, refined language options and runtime behaviors will be leveraged to bypass safety assumptions.”
“On this case, deprecated or hardly ever used constructs, mixed with interpreter adjustments and exception dealing with conduct, have been sufficient to interrupt out of in any other case restrictive sandboxes and obtain distant code execution.”
Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the most recent breakthroughs, get unique updates, and join with a worldwide community of future-focused thinkers.
Unlock tomorrow’s traits as we speak: learn extra, subscribe to our e-newsletter, and change into a part of the NextTech neighborhood at NextTech-news.com

