CVE-2026-27493: CWE-94: Improper Control of Generation of Code ('Code Injection') in n8n-io n8n
CVE-2026-27493 is a critical code injection vulnerability in the open-source workflow automation platform n8n, affecting versions prior to 2. 10. 1, 2. 9. 3, and 1. 123. 22. The flaw arises from a second-order expression injection in n8n's Form nodes, allowing unauthenticated attackers to inject and evaluate arbitrary expressions by submitting crafted form data starting with an '=' character. Exploitation requires a specific workflow configuration where a form node interpolates user-supplied input as an expression, which is uncommon and likely noticeable. While the expression injection alone is limited to the n8n expression context, chaining it with a separate sandbox escape vulnerability can lead to remote code execution on the host.
AI Analysis
Technical Summary
CVE-2026-27493 is a critical vulnerability in n8n, an open-source workflow automation platform widely used for integrating and automating tasks. The issue is a second-order expression injection vulnerability located in the Form nodes of n8n versions prior to 2.10.1, 2.9.3, and 1.123.22. The vulnerability stems from the way n8n processes form input fields that begin with an '=' character, which causes n8n to treat the input as an expression and evaluate it twice. An unauthenticated attacker can submit crafted form data with this prefix to inject arbitrary n8n expressions. However, exploitation requires a specific workflow setup: a form node must interpolate a user-controlled value as an expression, which is not typical and would likely be noticed by workflow designers. The expression injection itself is constrained to the n8n expression context and does not directly allow arbitrary code execution. Nevertheless, if combined with a separate sandbox escape vulnerability, it can escalate to remote code execution on the host system running n8n. This chaining significantly raises the risk, enabling attackers to execute arbitrary commands remotely without authentication. The vulnerability is tracked under CWE-94 (Improper Control of Generation of Code) and CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code). The issue was publicly disclosed on February 25, 2026, with a CVSS 4.0 score of 9.5, reflecting its critical severity and ease of exploitation without user interaction or privileges. No known exploits have been reported in the wild yet. The recommended remediation is to upgrade n8n to versions 2.10.1, 2.9.3, or 1.123.22 or later. If immediate upgrading is not feasible, administrators should manually review workflows for vulnerable form nodes, disable the Form node by adding 'n8n-nodes-base.form' to the NODES_EXCLUDE environment variable, and/or disable the Form Trigger node similarly. These mitigations reduce risk but do not fully eliminate it. Organizations should prioritize patching to prevent potential exploitation, especially in public-facing or internet-accessible n8n instances.
Potential Impact
The impact of CVE-2026-27493 is severe for organizations using vulnerable versions of n8n, particularly those exposing workflow forms to unauthenticated users. Successful exploitation can lead to arbitrary code execution on the host system, compromising confidentiality, integrity, and availability. Attackers could execute malicious commands, deploy malware, exfiltrate sensitive data, or disrupt automated workflows critical to business operations. Given n8n's role in automating integrations and processes, a compromise could cascade, affecting connected systems and services. The vulnerability requires a specific workflow configuration and chaining with another sandbox escape, which may limit widespread exploitation but does not eliminate risk. Organizations running n8n in production, especially in cloud or internet-facing environments, face heightened risk of targeted attacks. The lack of authentication and user interaction requirements further increase the threat level. Although no known exploits are reported yet, the critical CVSS score and potential for remote code execution necessitate urgent remediation to prevent severe operational and security consequences.
Mitigation Recommendations
1. Upgrade n8n immediately to versions 2.10.1, 2.9.3, or 1.123.22 or later, which contain the fix for this vulnerability. 2. Conduct a thorough manual review of all workflows using Form nodes to identify any that interpolate user input as expressions, especially those accepting inputs starting with '='. 3. Temporarily disable the Form node by adding 'n8n-nodes-base.form' to the NODES_EXCLUDE environment variable to prevent usage of vulnerable nodes. 4. Similarly, disable the Form Trigger node by adding 'n8n-nodes-base.formTrigger' to NODES_EXCLUDE to reduce attack surface. 5. Restrict access to n8n instances, especially those exposed to unauthenticated users, by implementing network-level controls such as VPNs, firewalls, or IP whitelisting. 6. Monitor logs and workflow executions for suspicious activity indicative of expression injection attempts or sandbox escape exploits. 7. Educate workflow designers to avoid using expressions that interpolate user input directly, and implement input validation or sanitization where possible. 8. Stay informed about any emerging exploits or patches related to sandbox escape vulnerabilities that could be chained with this issue. These steps collectively reduce risk and help prevent exploitation until full remediation is applied.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Japan, India, Brazil
CVE-2026-27493: CWE-94: Improper Control of Generation of Code ('Code Injection') in n8n-io n8n
Description
CVE-2026-27493 is a critical code injection vulnerability in the open-source workflow automation platform n8n, affecting versions prior to 2. 10. 1, 2. 9. 3, and 1. 123. 22. The flaw arises from a second-order expression injection in n8n's Form nodes, allowing unauthenticated attackers to inject and evaluate arbitrary expressions by submitting crafted form data starting with an '=' character. Exploitation requires a specific workflow configuration where a form node interpolates user-supplied input as an expression, which is uncommon and likely noticeable. While the expression injection alone is limited to the n8n expression context, chaining it with a separate sandbox escape vulnerability can lead to remote code execution on the host.
AI-Powered Analysis
Technical Analysis
CVE-2026-27493 is a critical vulnerability in n8n, an open-source workflow automation platform widely used for integrating and automating tasks. The issue is a second-order expression injection vulnerability located in the Form nodes of n8n versions prior to 2.10.1, 2.9.3, and 1.123.22. The vulnerability stems from the way n8n processes form input fields that begin with an '=' character, which causes n8n to treat the input as an expression and evaluate it twice. An unauthenticated attacker can submit crafted form data with this prefix to inject arbitrary n8n expressions. However, exploitation requires a specific workflow setup: a form node must interpolate a user-controlled value as an expression, which is not typical and would likely be noticed by workflow designers. The expression injection itself is constrained to the n8n expression context and does not directly allow arbitrary code execution. Nevertheless, if combined with a separate sandbox escape vulnerability, it can escalate to remote code execution on the host system running n8n. This chaining significantly raises the risk, enabling attackers to execute arbitrary commands remotely without authentication. The vulnerability is tracked under CWE-94 (Improper Control of Generation of Code) and CWE-95 (Improper Neutralization of Directives in Dynamically Evaluated Code). The issue was publicly disclosed on February 25, 2026, with a CVSS 4.0 score of 9.5, reflecting its critical severity and ease of exploitation without user interaction or privileges. No known exploits have been reported in the wild yet. The recommended remediation is to upgrade n8n to versions 2.10.1, 2.9.3, or 1.123.22 or later. If immediate upgrading is not feasible, administrators should manually review workflows for vulnerable form nodes, disable the Form node by adding 'n8n-nodes-base.form' to the NODES_EXCLUDE environment variable, and/or disable the Form Trigger node similarly. These mitigations reduce risk but do not fully eliminate it. Organizations should prioritize patching to prevent potential exploitation, especially in public-facing or internet-accessible n8n instances.
Potential Impact
The impact of CVE-2026-27493 is severe for organizations using vulnerable versions of n8n, particularly those exposing workflow forms to unauthenticated users. Successful exploitation can lead to arbitrary code execution on the host system, compromising confidentiality, integrity, and availability. Attackers could execute malicious commands, deploy malware, exfiltrate sensitive data, or disrupt automated workflows critical to business operations. Given n8n's role in automating integrations and processes, a compromise could cascade, affecting connected systems and services. The vulnerability requires a specific workflow configuration and chaining with another sandbox escape, which may limit widespread exploitation but does not eliminate risk. Organizations running n8n in production, especially in cloud or internet-facing environments, face heightened risk of targeted attacks. The lack of authentication and user interaction requirements further increase the threat level. Although no known exploits are reported yet, the critical CVSS score and potential for remote code execution necessitate urgent remediation to prevent severe operational and security consequences.
Mitigation Recommendations
1. Upgrade n8n immediately to versions 2.10.1, 2.9.3, or 1.123.22 or later, which contain the fix for this vulnerability. 2. Conduct a thorough manual review of all workflows using Form nodes to identify any that interpolate user input as expressions, especially those accepting inputs starting with '='. 3. Temporarily disable the Form node by adding 'n8n-nodes-base.form' to the NODES_EXCLUDE environment variable to prevent usage of vulnerable nodes. 4. Similarly, disable the Form Trigger node by adding 'n8n-nodes-base.formTrigger' to NODES_EXCLUDE to reduce attack surface. 5. Restrict access to n8n instances, especially those exposed to unauthenticated users, by implementing network-level controls such as VPNs, firewalls, or IP whitelisting. 6. Monitor logs and workflow executions for suspicious activity indicative of expression injection attempts or sandbox escape exploits. 7. Educate workflow designers to avoid using expressions that interpolate user input directly, and implement input validation or sanitization where possible. 8. Stay informed about any emerging exploits or patches related to sandbox escape vulnerabilities that could be chained with this issue. These steps collectively reduce risk and help prevent exploitation until full remediation is applied.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-19T19:46:03.542Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699f7718b7ef31ef0b6119dc
Added to database: 2/25/2026, 10:26:32 PM
Last enriched: 2/25/2026, 10:41:22 PM
Last updated: 2/26/2026, 10:46:16 AM
Views: 72
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighTrend Micro Patches Critical Apex One Vulnerabilities
CriticalCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.