Critical n8n Flaws Allow Remote Code Execution and Exposure of Stored Credentials
EXECUTIVE SUMMARY
Critical Vulnerabilities in n8n Enable Remote Code Execution
Summary
Cybersecurity researchers have identified and disclosed two critical security vulnerabilities in the n8n workflow automation platform. These flaws could lead to arbitrary command execution and exposure of stored credentials.
Key Points
- Two critical vulnerabilities have been discovered in the n8n platform.
- CVE-2026-27577 has a CVSS score of 9.4 and involves an expression sandbox escape leading to remote code execution (RCE).
- CVE-2026-27493 has a CVSS score of 9.5 and allows unauthenticated access, potentially exposing sensitive data.
- Both vulnerabilities have been patched, mitigating the immediate risk.
- The vulnerabilities could have allowed attackers to execute arbitrary commands and access stored credentials.
Analysis
The discovery of these critical vulnerabilities in n8n highlights the importance of regular security audits and timely patch management. With CVSS scores of 9.4 and 9.5, these flaws represent a significant risk, particularly due to the potential for remote code execution and unauthorized access. Organizations using n8n should prioritize applying the patches to protect their systems and data.
Conclusion
IT professionals should ensure that their n8n installations are updated with the latest patches to mitigate these critical vulnerabilities. Regular monitoring and vulnerability assessments are recommended to prevent similar issues in the future.