Close Menu
  • Home
  • Opinion
  • Region
    • Africa
    • Asia
    • Europe
    • Middle East
    • North America
    • Oceania
    • South America
  • AI & Machine Learning
  • Robotics & Automation
  • Space & Deep Tech
  • Web3 & Digital Economies
  • Climate & Sustainability Tech
  • Biotech & Future Health
  • Mobility & Smart Cities
  • Global Tech Pulse
  • Cybersecurity & Digital Rights
  • Future of Work & Education
  • Trend Radar & Startup Watch
  • Creator Economy & Culture
What's Hot

Podcast: Startup 360 is again, speaking Sendle, Airwallex, SXSW Sydney, and chief of employees life with GreenPay cofounder Maddi Ingham

February 1, 2026

Remotify CEO Maria Sucgang Acknowledged as Tatler Gen.T Chief of Tomorrow

February 1, 2026

What Is eCOA? – Essential Knowledge Options

February 1, 2026
Facebook X (Twitter) Instagram LinkedIn RSS
NextTech NewsNextTech News
Facebook X (Twitter) Instagram LinkedIn RSS
  • Home
  • Africa
  • Asia
  • Europe
  • Middle East
  • North America
  • Oceania
  • South America
  • Opinion
Trending
  • Podcast: Startup 360 is again, speaking Sendle, Airwallex, SXSW Sydney, and chief of employees life with GreenPay cofounder Maddi Ingham
  • Remotify CEO Maria Sucgang Acknowledged as Tatler Gen.T Chief of Tomorrow
  • What Is eCOA? – Essential Knowledge Options
  • Remark: Why predictive intelligence is non-negotiable for UK water
  • How Manufacturers Can Win Large Cultural Moments Like The Tremendous Bowl With Creators: 48 Specialists Weigh In 
  • Constructing India’s future by way of a youth-driven roadmap for training, jobs
  • Two Excessive-Severity n8n Flaws Permit Authenticated Distant Code Execution
  • I assumed I’d hate Spotify’s AI playlists, however I don’t
Sunday, February 1
NextTech NewsNextTech News
Home - Cybersecurity & Digital Rights - Two Excessive-Severity n8n Flaws Permit Authenticated Distant Code Execution
Cybersecurity & Digital Rights

Two Excessive-Severity n8n Flaws Permit Authenticated Distant Code Execution

NextTechBy NextTechFebruary 1, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
Follow Us
Google News Flipboard
Two Excessive-Severity n8n Flaws Permit Authenticated Distant Code Execution
Share
Facebook Twitter LinkedIn Pinterest Email


Ravie LakshmananJan 28, 2026Vulnerability / Workflow Automation

Cybersecurity researchers have disclosed two new safety flaws within the n8n workflow automation platform, together with a vital vulnerability that might lead to distant code execution.

The weaknesses, found by the JFrog Safety Analysis workforce, are listed under –

  • CVE-2026-1470 (CVSS rating: 9.9) – An eval injection vulnerability that might permit an authenticated person to bypass the Expression sandbox mechanism and obtain full distant code execution on n8n’s most important node by passing specifically crafted JavaScript code
  • CVE-2026-0863 (CVSS rating: 8.5) – An eval injection vulnerability that might permit an authenticated person to bypass n8n’s python-task-executor sandbox restrictions and run arbitrary Python code on the underlying working system

Shachar Menashe, JFrog’s vice chairman of safety analysis, instructed The Hacker information that one of many causes for CVE-2026-1470’s excessive CVSS rating regardless of requiring authentication is that “any person of n8n can exploit this situation and achieve an entire takeover of all the n8n occasion, in order that makes it a bit extra harmful.”

Profitable exploitation of the failings may allow an attacker to hijack a whole n8n occasion, together with underneath situations the place it is working underneath “inside” execution mode. In its documentation, n8n notes that utilizing inside mode in manufacturing environments can pose a safety danger, urging customers to modify to exterior mode to make sure correct isolation between n8n and activity runner processes.

Cybersecurity

“As n8n spans a whole group to automate AI workflows, it holds the keys to core instruments, capabilities, and information from infrastructure, together with LLM APIs, gross sales information, and inside IAM programs, amongst others,” JFrog stated in a press release shared with The Hacker Information. “This ends in escapes giving a hacker an efficient “skeleton key” to all the company.”

To handle the failings, customers are suggested to replace to the next variations –

  • CVE-2026-1470 – 1.123.17, 2.4.5, or 2.5.1
  • CVE-2026-0863 – 1.123.14, 2.3.5, or 2.4.2

The event comes merely weeks after Cyera Analysis Labs detailed a maximum-severity safety flaw in n8n (CVE-2026-21858 aka Ni8mare) that permits an unauthenticated distant attacker to realize full management over prone cases. As of January 27, 2026, greater than 39,000 n8n cases stay prone to the flaw, per information from the Shadowserver Basis.

“These vulnerabilities spotlight how tough it’s to securely sandbox dynamic, excessive‑stage languages equivalent to JavaScript and Python,” researcher Nathan Nehorai stated. “Even with a number of validation layers, deny lists, and AST‑primarily based controls in place, refined language options and runtime behaviors will be leveraged to bypass safety assumptions.”

“On this case, deprecated or hardly ever used constructs, mixed with interpreter adjustments and exception dealing with conduct, have been sufficient to interrupt out of in any other case restrictive sandboxes and obtain distant code execution.”

Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the most recent breakthroughs, get unique updates, and join with a worldwide community of future-focused thinkers.
Unlock tomorrow’s traits as we speak: learn extra, subscribe to our e-newsletter, and change into a part of the NextTech neighborhood at NextTech-news.com

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
NextTech
  • Website

Related Posts

How you can bypass the MEGA obtain restrict with a VPN

February 1, 2026

This month in safety with Tony Anscombe – January 2026 version

January 31, 2026

From Quantum to AI Dangers: Making ready for Cybersecurity’s Future

January 31, 2026
Add A Comment
Leave A Reply Cancel Reply

Economy News

Podcast: Startup 360 is again, speaking Sendle, Airwallex, SXSW Sydney, and chief of employees life with GreenPay cofounder Maddi Ingham

By NextTechFebruary 1, 2026

Welcome again to Startup 360. For the primary episode of 2026, Majella and Simon speak…

Remotify CEO Maria Sucgang Acknowledged as Tatler Gen.T Chief of Tomorrow

February 1, 2026

What Is eCOA? – Essential Knowledge Options

February 1, 2026
Top Trending

Podcast: Startup 360 is again, speaking Sendle, Airwallex, SXSW Sydney, and chief of employees life with GreenPay cofounder Maddi Ingham

By NextTechFebruary 1, 2026

Welcome again to Startup 360. For the primary episode of 2026, Majella…

Remotify CEO Maria Sucgang Acknowledged as Tatler Gen.T Chief of Tomorrow

By NextTechFebruary 1, 2026

MANILA, PHILIPPINES / ACCESS Newswire / February 1, 2026 / Remotify, a…

What Is eCOA? – Essential Knowledge Options

By NextTechFebruary 1, 2026

Digital scientific end result evaluation (eCOA) is a technique to gather scientific…

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

NEXTTECH-LOGO
Facebook X (Twitter) Instagram YouTube

AI & Machine Learning

Robotics & Automation

Space & Deep Tech

Web3 & Digital Economies

Climate & Sustainability Tech

Biotech & Future Health

Mobility & Smart Cities

Global Tech Pulse

Cybersecurity & Digital Rights

Future of Work & Education

Creator Economy & Culture

Trend Radar & Startup Watch

News By Region

Africa

Asia

Europe

Middle East

North America

Oceania

South America

2025 © NextTech-News. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms Of Service
  • Advertise With Us
  • Write For Us
  • Submit Article & Press Release

Type above and press Enter to search. Press Esc to cancel.

Subscribe For Latest Updates

Sign up to best of Tech news, informed analysis and opinions on what matters to you.

Invalid email address
 We respect your inbox and never send spam. You can unsubscribe from our newsletter at any time.     
Thanks for subscribing!