New Vulnerability in N8n

New Vulnerability in N8n

Schneier on Security
Schneier on SecurityJan 15, 2026

Key Takeaways

  • Critical CVE‑2026‑21858 scores 10.0 CVSS.
  • Affects ~100,000 n8n instances worldwide.
  • No workaround; upgrade to v1.121.0+ required.
  • Exploits allow full remote code execution on local deployments.
  • Supply‑chain attack highlights automation platform risk.

Pulse Analysis

n8n has become a cornerstone for low‑code workflow automation, enabling businesses to stitch together APIs, databases, and SaaS tools without extensive development effort. The newly disclosed CVE‑2026‑21858 exploits a flaw in the platform’s authentication flow, granting unauthenticated attackers remote code execution on any locally hosted instance. With a perfect CVSS score of 10.0, the vulnerability signals a worst‑case scenario where threat actors can hijack automation pipelines, exfiltrate data, or pivot laterally within corporate networks.

The scale of exposure is significant: estimates suggest roughly 100,000 n8n servers are running vulnerable versions globally, many of which power critical business processes such as order fulfillment, incident response, and data synchronization. Because the vulnerability resides in the core runtime, there are no temporary mitigations; the only effective remedy is upgrading to version 1.121.0 or newer, which patches the authentication bypass and hardens the execution environment. Organizations should prioritize patch deployment, verify version compliance across all environments, and review access controls for any remaining legacy instances.

Beyond the immediate fix, the n8n incident underscores a broader risk landscape for automation and integration platforms. As enterprises lean heavily on these tools to accelerate digital transformation, supply‑chain attacks targeting underlying software can cascade across multiple vendors and services. Security teams must adopt continuous monitoring, enforce strict patch management, and consider zero‑trust networking principles to limit the blast radius of similar exploits. Investing in automated vulnerability scanning for workflow engines will become a best practice as the market matures.

New Vulnerability in n8n

Comments

Want to join the conversation?