Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsCritical RCE Flaw Allows Full Takeover of N8n AI Workflow Platform
Critical RCE Flaw Allows Full Takeover of N8n AI Workflow Platform
Cybersecurity

Critical RCE Flaw Allows Full Takeover of N8n AI Workflow Platform

•January 7, 2026
0
CSO Online
CSO Online•Jan 7, 2026

Companies Mentioned

n8n

n8n

Cyera

Cyera

Google

Google

GOOG

OpenAI

OpenAI

Salesforce

Salesforce

CRM

Why It Matters

A compromised n8n instance gives threat actors access to every integrated service and credential, turning a single automation server into a high‑value single point of failure for enterprises.

Key Takeaways

  • •Unauthenticated RCE in n8n via malformed Content-Type
  • •CVE‑2026‑21858 rated 10.0, allows file read and overwrite
  • •Attackers can reconstruct admin session cookies from config files
  • •Patch released in n8n 1.121.0; update immediately
  • •n8n serves as central automation hub, amplifying breach impact

Pulse Analysis

The n8n platform has become a backbone for modern enterprises, stitching together APIs, cloud storage, and AI services into seamless workflows. Its flexibility, however, creates a broad attack surface: a single flaw in the formWebhook handler can expose internal files and, by extension, the secrets they contain. The CVE‑2026‑21858 vulnerability exploits a missing Content‑Type check, allowing attackers to submit JSON payloads that masquerade as file uploads, leading to arbitrary file reads and path‑traversal writes.

Beyond the immediate file‑access risk, the flaw enables credential harvesting that defeats n8n’s authentication model. Session cookies are derived from a secret key and user records stored in plain‑text configuration files. Once an adversary extracts these files, they can forge valid admin cookies, gain full control of the workflow engine, and invoke the Execute Command node to run arbitrary OS commands. This chain effectively turns n8n into a remote shell, compromising any downstream systems that rely on its integrations— from Salesforce and Google Drive to payment processors and CI/CD pipelines.

For organizations, the lesson is twofold. First, maintain a rigorous patch cadence; the silent release of version 1.121.0 illustrates that critical fixes may not be announced promptly. Second, treat automation platforms as privileged assets, enforcing network segmentation, least‑privilege API keys, and regular secret rotation. By hardening the surrounding environment and monitoring for anomalous webhook traffic, firms can mitigate the outsized blast radius that a single compromised n8n instance now presents.

Critical RCE flaw allows full takeover of n8n AI workflow platform

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...