CVE-2026-21893: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in n8n-io n8n
n8n is an open source workflow automation platform. From version 0.187.0 to before 1.120.3, a command injection vulnerability was identified in n8n’s community package installation functionality. The issue allowed authenticated users with administrative permissions to execute arbitrary system commands on the n8n host under specific conditions. This issue has been patched in version 1.120.3.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-21893 affects the n8n open source workflow automation platform, specifically versions from 0.187.0 up to 1.120.3. The flaw is an OS command injection (CWE-78) stemming from improper neutralization of special characters in the community package installation functionality. This allows an authenticated user with administrative privileges to inject and execute arbitrary system commands on the host operating system. The vulnerability does not require user interaction but does require high privileges (administrative access) to exploit. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) reflects network attack vector, low attack complexity, no user interaction, but requiring high privileges, and with high impact on confidentiality, integrity, and availability. The vulnerability could lead to full system compromise, data theft, or disruption of automation workflows. The issue was publicly disclosed and patched in version 1.120.3 of n8n. No known exploits have been reported in the wild yet, but the critical severity demands immediate attention. The root cause is insufficient input validation and sanitization in the command execution path related to package installation, allowing injection of malicious OS commands. This vulnerability highlights the risks of granting administrative permissions broadly in automation platforms and the importance of secure coding practices for command execution features.
Potential Impact
For European organizations, the impact of CVE-2026-21893 can be severe, especially for those relying on n8n for critical automation workflows in IT operations, business processes, or industrial control systems. Successful exploitation could allow attackers to execute arbitrary commands on the host system, potentially leading to full system compromise, data exfiltration, disruption of services, or lateral movement within the network. This could affect confidentiality, integrity, and availability of sensitive data and operational processes. Organizations with multiple administrators or shared admin credentials face increased risk of insider threats or credential compromise leading to exploitation. The automation nature of n8n means that compromised hosts could be used to propagate malicious commands or disrupt automated business-critical tasks. Given the high CVSS score and the network-exploitable nature of the vulnerability, the threat is significant for enterprises, government agencies, and critical infrastructure operators in Europe using n8n. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future attacks, especially as threat actors often target automation platforms to maximize impact.
Mitigation Recommendations
1. Immediately upgrade all n8n instances to version 1.120.3 or later, where the vulnerability is patched. 2. Restrict administrative privileges to the minimum necessary number of users and enforce strong authentication mechanisms such as multi-factor authentication (MFA) for admin accounts. 3. Conduct an audit of all users with administrative access to ensure only trusted personnel have such privileges. 4. Monitor logs and system activity for unusual command execution or package installation attempts that could indicate exploitation attempts. 5. Implement network segmentation to isolate n8n hosts from critical infrastructure and sensitive data stores to limit potential lateral movement. 6. Review and harden the configuration of n8n workflows to minimize exposure of sensitive commands or scripts. 7. Educate administrators on the risks of command injection vulnerabilities and the importance of secure package management practices. 8. Consider deploying runtime application self-protection (RASP) or host-based intrusion detection systems (HIDS) to detect anomalous command execution. 9. Regularly update and patch all automation and workflow platforms as part of a robust vulnerability management program.
Affected Countries
Germany, France, United Kingdom, Netherlands, Sweden, Belgium, Italy
CVE-2026-21893: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in n8n-io n8n
Description
n8n is an open source workflow automation platform. From version 0.187.0 to before 1.120.3, a command injection vulnerability was identified in n8n’s community package installation functionality. The issue allowed authenticated users with administrative permissions to execute arbitrary system commands on the n8n host under specific conditions. This issue has been patched in version 1.120.3.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2026-21893 affects the n8n open source workflow automation platform, specifically versions from 0.187.0 up to 1.120.3. The flaw is an OS command injection (CWE-78) stemming from improper neutralization of special characters in the community package installation functionality. This allows an authenticated user with administrative privileges to inject and execute arbitrary system commands on the host operating system. The vulnerability does not require user interaction but does require high privileges (administrative access) to exploit. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) reflects network attack vector, low attack complexity, no user interaction, but requiring high privileges, and with high impact on confidentiality, integrity, and availability. The vulnerability could lead to full system compromise, data theft, or disruption of automation workflows. The issue was publicly disclosed and patched in version 1.120.3 of n8n. No known exploits have been reported in the wild yet, but the critical severity demands immediate attention. The root cause is insufficient input validation and sanitization in the command execution path related to package installation, allowing injection of malicious OS commands. This vulnerability highlights the risks of granting administrative permissions broadly in automation platforms and the importance of secure coding practices for command execution features.
Potential Impact
For European organizations, the impact of CVE-2026-21893 can be severe, especially for those relying on n8n for critical automation workflows in IT operations, business processes, or industrial control systems. Successful exploitation could allow attackers to execute arbitrary commands on the host system, potentially leading to full system compromise, data exfiltration, disruption of services, or lateral movement within the network. This could affect confidentiality, integrity, and availability of sensitive data and operational processes. Organizations with multiple administrators or shared admin credentials face increased risk of insider threats or credential compromise leading to exploitation. The automation nature of n8n means that compromised hosts could be used to propagate malicious commands or disrupt automated business-critical tasks. Given the high CVSS score and the network-exploitable nature of the vulnerability, the threat is significant for enterprises, government agencies, and critical infrastructure operators in Europe using n8n. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the potential for future attacks, especially as threat actors often target automation platforms to maximize impact.
Mitigation Recommendations
1. Immediately upgrade all n8n instances to version 1.120.3 or later, where the vulnerability is patched. 2. Restrict administrative privileges to the minimum necessary number of users and enforce strong authentication mechanisms such as multi-factor authentication (MFA) for admin accounts. 3. Conduct an audit of all users with administrative access to ensure only trusted personnel have such privileges. 4. Monitor logs and system activity for unusual command execution or package installation attempts that could indicate exploitation attempts. 5. Implement network segmentation to isolate n8n hosts from critical infrastructure and sensitive data stores to limit potential lateral movement. 6. Review and harden the configuration of n8n workflows to minimize exposure of sensitive commands or scripts. 7. Educate administrators on the risks of command injection vulnerabilities and the importance of secure package management practices. 8. Consider deploying runtime application self-protection (RASP) or host-based intrusion detection systems (HIDS) to detect anomalous command execution. 9. Regularly update and patch all automation and workflow platforms as part of a robust vulnerability management program.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-01-05T17:24:36.929Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6983892af9fa50a62fa00a11
Added to database: 2/4/2026, 6:00:10 PM
Last enriched: 2/4/2026, 6:14:47 PM
Last updated: 2/7/2026, 12:20:43 AM
Views: 34
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighCVE-2026-25803: CWE-798: Use of Hard-coded Credentials in denpiligrim 3dp-manager
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.