CVE-2026-1470: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations.
AI Analysis
Technical Summary
CVE-2026-1470 is a critical vulnerability in the n8n automation platform's workflow expression evaluation system. n8n allows users to create complex workflows using expressions that are dynamically evaluated at runtime. This vulnerability stems from improper neutralization of directives in these dynamically evaluated expressions (classified as CWE-95, Eval Injection). Authenticated users configuring workflows can inject malicious code into expressions, which the system evaluates without sufficient isolation from the underlying runtime environment. This flaw enables attackers to execute arbitrary code with the same privileges as the n8n process, potentially leading to full compromise of the affected instance. The attacker can access sensitive data, alter workflows to persist malicious behavior, and execute system-level commands, which could include lateral movement or data exfiltration. The vulnerability affects n8n versions 0, 2.0.0, and 2.5.0, and was published on January 27, 2026. The CVSS v3.1 score is 9.9 (critical), reflecting network attack vector, low attack complexity, required privileges (authenticated user), no user interaction, and complete impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the severity and ease of exploitation by authenticated users make this a high-priority threat. The lack of patch links suggests that fixes may not yet be publicly available, increasing urgency for mitigation.
Potential Impact
For European organizations, the impact of CVE-2026-1470 can be severe. n8n is used for automating workflows that often integrate multiple business-critical systems and sensitive data sources. Exploitation could lead to unauthorized access to confidential information, disruption of automated business processes, and potential spread of malware or ransomware through compromised workflows. Organizations in sectors such as finance, healthcare, manufacturing, and government could face operational downtime, regulatory penalties under GDPR due to data breaches, and reputational damage. The ability to execute system-level commands also raises the risk of persistent backdoors or lateral movement within corporate networks. Since exploitation requires authentication, insider threats or compromised credentials increase risk. The critical severity and broad impact on confidentiality, integrity, and availability make this vulnerability a significant threat to European enterprises relying on n8n for automation.
Mitigation Recommendations
1. Immediately restrict access to n8n instances to trusted users only and enforce strong authentication mechanisms, including multi-factor authentication (MFA). 2. Monitor and audit workflow configurations for suspicious or unexpected expressions, especially those created or modified by users with elevated privileges. 3. Apply network segmentation to isolate n8n servers from sensitive backend systems to limit potential lateral movement. 4. If patches or updates become available from n8n, apply them promptly. 5. Consider disabling or restricting the use of dynamic expression evaluation features until a secure patch is deployed. 6. Implement runtime application self-protection (RASP) or Web Application Firewalls (WAF) with custom rules to detect and block suspicious payloads targeting expression evaluation. 7. Regularly review and rotate credentials used by n8n workflows to reduce risk from compromised accounts. 8. Conduct internal penetration testing focused on workflow expression injection to identify and remediate vulnerable configurations. 9. Educate developers and administrators on secure workflow design to avoid unsafe expression usage.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Italy, Spain, Belgium
CVE-2026-1470: CWE-95 Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection')
Description
n8n contains a critical Remote Code Execution (RCE) vulnerability in its workflow Expression evaluation system. Expressions supplied by authenticated users during workflow configuration may be evaluated in an execution context that is not sufficiently isolated from the underlying runtime. An authenticated attacker could abuse this behavior to execute arbitrary code with the privileges of the n8n process. Successful exploitation may lead to full compromise of the affected instance, including unauthorized access to sensitive data, modification of workflows, and execution of system-level operations.
AI-Powered Analysis
Technical Analysis
CVE-2026-1470 is a critical vulnerability in the n8n automation platform's workflow expression evaluation system. n8n allows users to create complex workflows using expressions that are dynamically evaluated at runtime. This vulnerability stems from improper neutralization of directives in these dynamically evaluated expressions (classified as CWE-95, Eval Injection). Authenticated users configuring workflows can inject malicious code into expressions, which the system evaluates without sufficient isolation from the underlying runtime environment. This flaw enables attackers to execute arbitrary code with the same privileges as the n8n process, potentially leading to full compromise of the affected instance. The attacker can access sensitive data, alter workflows to persist malicious behavior, and execute system-level commands, which could include lateral movement or data exfiltration. The vulnerability affects n8n versions 0, 2.0.0, and 2.5.0, and was published on January 27, 2026. The CVSS v3.1 score is 9.9 (critical), reflecting network attack vector, low attack complexity, required privileges (authenticated user), no user interaction, and complete impact on confidentiality, integrity, and availability. Although no known exploits are currently reported in the wild, the severity and ease of exploitation by authenticated users make this a high-priority threat. The lack of patch links suggests that fixes may not yet be publicly available, increasing urgency for mitigation.
Potential Impact
For European organizations, the impact of CVE-2026-1470 can be severe. n8n is used for automating workflows that often integrate multiple business-critical systems and sensitive data sources. Exploitation could lead to unauthorized access to confidential information, disruption of automated business processes, and potential spread of malware or ransomware through compromised workflows. Organizations in sectors such as finance, healthcare, manufacturing, and government could face operational downtime, regulatory penalties under GDPR due to data breaches, and reputational damage. The ability to execute system-level commands also raises the risk of persistent backdoors or lateral movement within corporate networks. Since exploitation requires authentication, insider threats or compromised credentials increase risk. The critical severity and broad impact on confidentiality, integrity, and availability make this vulnerability a significant threat to European enterprises relying on n8n for automation.
Mitigation Recommendations
1. Immediately restrict access to n8n instances to trusted users only and enforce strong authentication mechanisms, including multi-factor authentication (MFA). 2. Monitor and audit workflow configurations for suspicious or unexpected expressions, especially those created or modified by users with elevated privileges. 3. Apply network segmentation to isolate n8n servers from sensitive backend systems to limit potential lateral movement. 4. If patches or updates become available from n8n, apply them promptly. 5. Consider disabling or restricting the use of dynamic expression evaluation features until a secure patch is deployed. 6. Implement runtime application self-protection (RASP) or Web Application Firewalls (WAF) with custom rules to detect and block suspicious payloads targeting expression evaluation. 7. Regularly review and rotate credentials used by n8n workflows to reduce risk from compromised accounts. 8. Conduct internal penetration testing focused on workflow expression injection to identify and remediate vulnerable configurations. 9. Educate developers and administrators on secure workflow design to avoid unsafe expression usage.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- JFROG
- Date Reserved
- 2026-01-27T08:51:45.291Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6978cd4c4623b1157c2e02f7
Added to database: 1/27/2026, 2:35:56 PM
Last enriched: 1/27/2026, 2:50:19 PM
Last updated: 2/7/2026, 3:51:34 PM
Views: 216
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2090: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.