Close Menu
  • Home
  • Opinion
  • Region
    • Africa
    • Asia
    • Europe
    • Middle East
    • North America
    • Oceania
    • South America
  • AI & Machine Learning
  • Robotics & Automation
  • Space & Deep Tech
  • Web3 & Digital Economies
  • Climate & Sustainability Tech
  • Biotech & Future Health
  • Mobility & Smart Cities
  • Global Tech Pulse
  • Cybersecurity & Digital Rights
  • Future of Work & Education
  • Trend Radar & Startup Watch
  • Creator Economy & Culture
What's Hot

Yogiyo Brings Meals Discovery into ChatGPT, Signaling a New Interface Battle for Supply Apps – KoreaTechDesk

February 11, 2026

Galaxy Unpacked Is Occurring February twenty fifth

February 11, 2026

Aberdeen launches ‘life occasion’ web site for residents

February 11, 2026
Facebook X (Twitter) Instagram LinkedIn RSS
NextTech NewsNextTech News
Facebook X (Twitter) Instagram LinkedIn RSS
  • Home
  • Africa
  • Asia
  • Europe
  • Middle East
  • North America
  • Oceania
  • South America
  • Opinion
Trending
  • Yogiyo Brings Meals Discovery into ChatGPT, Signaling a New Interface Battle for Supply Apps – KoreaTechDesk
  • Galaxy Unpacked Is Occurring February twenty fifth
  • Aberdeen launches ‘life occasion’ web site for residents
  • Nationwide Robotics Week 2026 Underscores Robotics as a Essential U.S. Business and Workforce Engine
  • Astrophotography Improve: Stepping As much as CMOS
  • The Trump T1 Smartphone Lastly Surfaces, Gold End and All
  • Decoding ESOPs: A newbie’s information to worker possession
  • SCOPE Summit 2026: How Fee Practices and Operational Burden Are Altering Website Habits
Wednesday, February 11
NextTech NewsNextTech News
Home - Cybersecurity & Digital Rights - Two Excessive-Severity n8n Flaws Permit Authenticated Distant Code Execution
Cybersecurity & Digital Rights

Two Excessive-Severity n8n Flaws Permit Authenticated Distant Code Execution

NextTechBy NextTechFebruary 1, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Telegram Email Copy Link
Follow Us
Google News Flipboard
Two Excessive-Severity n8n Flaws Permit Authenticated Distant Code Execution
Share
Facebook Twitter LinkedIn Pinterest Email


Ravie LakshmananJan 28, 2026Vulnerability / Workflow Automation

Cybersecurity researchers have disclosed two new safety flaws within the n8n workflow automation platform, together with a vital vulnerability that might lead to distant code execution.

The weaknesses, found by the JFrog Safety Analysis workforce, are listed under –

  • CVE-2026-1470 (CVSS rating: 9.9) – An eval injection vulnerability that might permit an authenticated person to bypass the Expression sandbox mechanism and obtain full distant code execution on n8n’s most important node by passing specifically crafted JavaScript code
  • CVE-2026-0863 (CVSS rating: 8.5) – An eval injection vulnerability that might permit an authenticated person to bypass n8n’s python-task-executor sandbox restrictions and run arbitrary Python code on the underlying working system

Shachar Menashe, JFrog’s vice chairman of safety analysis, instructed The Hacker information that one of many causes for CVE-2026-1470’s excessive CVSS rating regardless of requiring authentication is that “any person of n8n can exploit this situation and achieve an entire takeover of all the n8n occasion, in order that makes it a bit extra harmful.”

Profitable exploitation of the failings may allow an attacker to hijack a whole n8n occasion, together with underneath situations the place it is working underneath “inside” execution mode. In its documentation, n8n notes that utilizing inside mode in manufacturing environments can pose a safety danger, urging customers to modify to exterior mode to make sure correct isolation between n8n and activity runner processes.

Cybersecurity

“As n8n spans a whole group to automate AI workflows, it holds the keys to core instruments, capabilities, and information from infrastructure, together with LLM APIs, gross sales information, and inside IAM programs, amongst others,” JFrog stated in a press release shared with The Hacker Information. “This ends in escapes giving a hacker an efficient “skeleton key” to all the company.”

To handle the failings, customers are suggested to replace to the next variations –

  • CVE-2026-1470 – 1.123.17, 2.4.5, or 2.5.1
  • CVE-2026-0863 – 1.123.14, 2.3.5, or 2.4.2

The event comes merely weeks after Cyera Analysis Labs detailed a maximum-severity safety flaw in n8n (CVE-2026-21858 aka Ni8mare) that permits an unauthenticated distant attacker to realize full management over prone cases. As of January 27, 2026, greater than 39,000 n8n cases stay prone to the flaw, per information from the Shadowserver Basis.

“These vulnerabilities spotlight how tough it’s to securely sandbox dynamic, excessive‑stage languages equivalent to JavaScript and Python,” researcher Nathan Nehorai stated. “Even with a number of validation layers, deny lists, and AST‑primarily based controls in place, refined language options and runtime behaviors will be leveraged to bypass safety assumptions.”

“On this case, deprecated or hardly ever used constructs, mixed with interpreter adjustments and exception dealing with conduct, have been sufficient to interrupt out of in any other case restrictive sandboxes and obtain distant code execution.”

Elevate your perspective with NextTech Information, the place innovation meets perception.
Uncover the most recent breakthroughs, get unique updates, and join with a worldwide community of future-focused thinkers.
Unlock tomorrow’s traits as we speak: learn extra, subscribe to our e-newsletter, and change into a part of the NextTech neighborhood at NextTech-news.com

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
NextTech
  • Website

Related Posts

In Bypassing MFA, ZeroDayRAT Is ‘Textbook Stalkerware’

February 11, 2026

Fortinet Patches Crucial SQLi Flaw Enabling Unauthenticated Code Execution

February 10, 2026

China-Linked UNC3886 Targets Singapore Telecom Sector in Cyber Espionage Marketing campaign

February 10, 2026
Add A Comment
Leave A Reply Cancel Reply

Economy News

Yogiyo Brings Meals Discovery into ChatGPT, Signaling a New Interface Battle for Supply Apps – KoreaTechDesk

By NextTechFebruary 11, 2026

South Korea’s meals supply market is testing a brand new entrance finish. Yogiyo has change…

Galaxy Unpacked Is Occurring February twenty fifth

February 11, 2026

Aberdeen launches ‘life occasion’ web site for residents

February 11, 2026
Top Trending

Yogiyo Brings Meals Discovery into ChatGPT, Signaling a New Interface Battle for Supply Apps – KoreaTechDesk

By NextTechFebruary 11, 2026

South Korea’s meals supply market is testing a brand new entrance finish.…

Galaxy Unpacked Is Occurring February twenty fifth

By NextTechFebruary 11, 2026

Samsung dropped their Galaxy Unpacked announcement this night, and it is best…

Aberdeen launches ‘life occasion’ web site for residents

By NextTechFebruary 11, 2026

The web site and enhanced webchat service offers residents a clearer and…

Subscribe to News

Get the latest sports news from NewsSite about world, sports and politics.

NEXTTECH-LOGO
Facebook X (Twitter) Instagram YouTube

AI & Machine Learning

Robotics & Automation

Space & Deep Tech

Web3 & Digital Economies

Climate & Sustainability Tech

Biotech & Future Health

Mobility & Smart Cities

Global Tech Pulse

Cybersecurity & Digital Rights

Future of Work & Education

Creator Economy & Culture

Trend Radar & Startup Watch

News By Region

Africa

Asia

Europe

Middle East

North America

Oceania

South America

2025 © NextTech-News. All Rights Reserved
  • About Us
  • Contact Us
  • Privacy Policy
  • Terms Of Service
  • Advertise With Us
  • Write For Us
  • Submit Article & Press Release

Type above and press Enter to search. Press Esc to cancel.

Subscribe For Latest Updates

Sign up to best of Tech news, informed analysis and opinions on what matters to you.

Invalid email address
 We respect your inbox and never send spam. You can unsubscribe from our newsletter at any time.     
Thanks for subscribing!