CVE-2026-27494: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in n8n-io n8n
n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could use the Python Code node to escape the sandbox. The sandbox did not sufficiently restrict access to certain built-in Python objects, allowing an attacker to exfiltrate file contents or achieve RCE. On instances using internal Task Runners (default runner mode), this could result in full compromise of the n8n host. On instances using external Task Runners, the attacker might gain access to or impact other task executed on the Task Runner. Task Runners must be enabled using `N8N_RUNNERS_ENABLED=true`. The issue has been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to this version or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Limit workflow creation and editing permissions to fully trusted users only., and/or disable the Code node by adding `n8n-nodes-base.code` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-27494 affects the n8n open source workflow automation platform in versions prior to 2.10.1, 2.9.3, and 1.123.22. The root cause lies in insufficient sandboxing of the Python Code node, which is designed to allow users to execute custom Python scripts within workflows. The sandbox failed to adequately restrict access to certain built-in Python objects, enabling an authenticated user with workflow creation or modification permissions to escape the sandbox environment. This escape allows attackers to read arbitrary files on the host system or execute arbitrary code remotely. The impact varies depending on the Task Runner configuration: with the default internal Task Runner, attackers can achieve full compromise of the host running n8n, while with external Task Runners enabled (via N8N_RUNNERS_ENABLED=true), attackers might access or interfere with other tasks running on the Task Runner. Exploitation requires authentication and specific permissions but no additional user interaction. The vulnerability is tracked under CWE-497, which relates to exposure of sensitive system information to unauthorized control spheres. The issue has been patched in the specified versions, and users are strongly advised to upgrade. Temporary mitigations include limiting workflow creation and editing permissions to trusted users and disabling the Code node by excluding it via environment variables, though these do not fully eliminate the risk.
Potential Impact
This vulnerability poses a critical risk to organizations using n8n for workflow automation, especially those with multiple users or exposed environments. Successful exploitation can lead to unauthorized disclosure of sensitive files, remote code execution, and potentially full system compromise on hosts running the internal Task Runner. This could result in data breaches, disruption of automated processes, lateral movement within networks, and loss of system integrity and availability. For environments using external Task Runners, attackers may disrupt or manipulate other tasks, potentially affecting business-critical workflows. The requirement for authenticated access with workflow modification permissions limits the attack surface but does not eliminate risk in multi-user or poorly controlled environments. Organizations relying on n8n in production, particularly those automating sensitive or critical operations, face significant operational and security impacts if this vulnerability is exploited.
Mitigation Recommendations
The primary mitigation is to upgrade n8n to versions 2.10.1, 2.9.3, or 1.123.22 or later, where the vulnerability is patched. Until upgrades can be performed, organizations should restrict workflow creation and modification permissions strictly to fully trusted administrators or users. Additionally, disabling the Python Code node by adding 'n8n-nodes-base.code' to the NODES_EXCLUDE environment variable can reduce risk but does not fully remediate the vulnerability. Monitoring and auditing workflow changes and user activities related to workflow creation can help detect potential exploitation attempts. For environments using external Task Runners, ensure strict isolation and access controls on the Task Runner hosts. Regularly review and harden authentication and authorization policies within n8n to minimize the number of users with elevated permissions. Finally, maintain network segmentation and host-level security controls to limit the impact of any potential compromise.
Affected Countries
United States, Germany, United Kingdom, Netherlands, Australia, Canada, France, Japan, South Korea, India
CVE-2026-27494: CWE-497: Exposure of Sensitive System Information to an Unauthorized Control Sphere in n8n-io n8n
Description
n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could use the Python Code node to escape the sandbox. The sandbox did not sufficiently restrict access to certain built-in Python objects, allowing an attacker to exfiltrate file contents or achieve RCE. On instances using internal Task Runners (default runner mode), this could result in full compromise of the n8n host. On instances using external Task Runners, the attacker might gain access to or impact other task executed on the Task Runner. Task Runners must be enabled using `N8N_RUNNERS_ENABLED=true`. The issue has been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to this version or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Limit workflow creation and editing permissions to fully trusted users only., and/or disable the Code node by adding `n8n-nodes-base.code` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-27494 affects the n8n open source workflow automation platform in versions prior to 2.10.1, 2.9.3, and 1.123.22. The root cause lies in insufficient sandboxing of the Python Code node, which is designed to allow users to execute custom Python scripts within workflows. The sandbox failed to adequately restrict access to certain built-in Python objects, enabling an authenticated user with workflow creation or modification permissions to escape the sandbox environment. This escape allows attackers to read arbitrary files on the host system or execute arbitrary code remotely. The impact varies depending on the Task Runner configuration: with the default internal Task Runner, attackers can achieve full compromise of the host running n8n, while with external Task Runners enabled (via N8N_RUNNERS_ENABLED=true), attackers might access or interfere with other tasks running on the Task Runner. Exploitation requires authentication and specific permissions but no additional user interaction. The vulnerability is tracked under CWE-497, which relates to exposure of sensitive system information to unauthorized control spheres. The issue has been patched in the specified versions, and users are strongly advised to upgrade. Temporary mitigations include limiting workflow creation and editing permissions to trusted users and disabling the Code node by excluding it via environment variables, though these do not fully eliminate the risk.
Potential Impact
This vulnerability poses a critical risk to organizations using n8n for workflow automation, especially those with multiple users or exposed environments. Successful exploitation can lead to unauthorized disclosure of sensitive files, remote code execution, and potentially full system compromise on hosts running the internal Task Runner. This could result in data breaches, disruption of automated processes, lateral movement within networks, and loss of system integrity and availability. For environments using external Task Runners, attackers may disrupt or manipulate other tasks, potentially affecting business-critical workflows. The requirement for authenticated access with workflow modification permissions limits the attack surface but does not eliminate risk in multi-user or poorly controlled environments. Organizations relying on n8n in production, particularly those automating sensitive or critical operations, face significant operational and security impacts if this vulnerability is exploited.
Mitigation Recommendations
The primary mitigation is to upgrade n8n to versions 2.10.1, 2.9.3, or 1.123.22 or later, where the vulnerability is patched. Until upgrades can be performed, organizations should restrict workflow creation and modification permissions strictly to fully trusted administrators or users. Additionally, disabling the Python Code node by adding 'n8n-nodes-base.code' to the NODES_EXCLUDE environment variable can reduce risk but does not fully remediate the vulnerability. Monitoring and auditing workflow changes and user activities related to workflow creation can help detect potential exploitation attempts. For environments using external Task Runners, ensure strict isolation and access controls on the Task Runner hosts. Regularly review and harden authentication and authorization policies within n8n to minimize the number of users with elevated permissions. Finally, maintain network segmentation and host-level security controls to limit the impact of any potential compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-19T19:46:03.542Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699f7718b7ef31ef0b6119e4
Added to database: 2/25/2026, 10:26:32 PM
Last enriched: 3/5/2026, 9:59:46 AM
Last updated: 4/12/2026, 4:50:48 AM
Views: 139
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.