radar

ONE Sentinel

securitySecurity/THREATS/CRIT

Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials

sourceThe Hacker News
calendar_todayMarch 11, 2026
schedule1 min read
lightbulb

EXECUTIVE SUMMARY

Critical Vulnerabilities in n8n Enable Remote Code Execution

Summary

Cybersecurity researchers have identified and disclosed two critical security vulnerabilities in the n8n workflow automation platform. These flaws could lead to arbitrary command execution and exposure of stored credentials.

Key Points

  • Two critical vulnerabilities have been discovered in the n8n platform.
  • CVE-2026-27577 has a CVSS score of 9.4 and involves an expression sandbox escape leading to remote code execution (RCE).
  • CVE-2026-27493 has a CVSS score of 9.5 and allows unauthenticated access, potentially exposing sensitive data.
  • Both vulnerabilities have been patched, mitigating the immediate risk.
  • The vulnerabilities could have allowed attackers to execute arbitrary commands and access stored credentials.

Analysis

The discovery of these critical vulnerabilities in n8n highlights the importance of regular security audits and timely patch management. With CVSS scores of 9.4 and 9.5, these flaws represent a significant risk, particularly due to the potential for remote code execution and unauthorized access. Organizations using n8n should prioritize applying the patches to protect their systems and data.

Conclusion

IT professionals should ensure that their n8n installations are updated with the latest patches to mitigate these critical vulnerabilities. Regular monitoring and vulnerability assessments are recommended to prevent similar issues in the future.