CVE-2026-27497: CWE-94: Improper Control of Generation of Code ('Code Injection') in n8n-io n8n
n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could leverage the Merge node's SQL query mode to execute arbitrary code and write arbitrary files on the n8n server. The issues have been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to one of these versions or later to remediate all known vulnerabilities. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Limit workflow creation and editing permissions to fully trusted users only, and/or disable the Merge node by adding `n8n-nodes-base.merge` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
AI Analysis
Technical Summary
CVE-2026-27497 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code) and CWE-89 (SQL Injection) affecting the open-source workflow automation platform n8n. The flaw exists in the Merge node's SQL query mode, which improperly handles user input, allowing an authenticated user with permissions to create or modify workflows to inject and execute arbitrary code on the n8n server. This capability extends to writing arbitrary files, enabling attackers to potentially deploy backdoors, manipulate workflows, or disrupt operations. Exploitation requires authentication but no additional user interaction, making it highly accessible to insiders or compromised accounts. The vulnerability affects multiple version ranges: all versions prior to 1.123.22, versions from 2.0.0 up to but not including 2.9.3, and versions 2.10.0 up to but not including 2.10.1. The vendor has addressed the issue in versions 2.10.1, 2.9.3, and 1.123.22. The CVSS 4.0 base score of 9.4 indicates a critical severity with network attack vector, low attack complexity, no privileges required beyond workflow modification rights, and no user interaction needed. The vulnerability's scope is high as it impacts confidentiality, integrity, and availability of the affected systems. Temporary mitigations include restricting workflow creation and editing permissions to fully trusted users and disabling the Merge node by excluding it via the NODES_EXCLUDE environment variable, though these are not complete fixes. No known exploits in the wild have been reported yet, but the severity and ease of exploitation make timely patching imperative.
Potential Impact
The impact of CVE-2026-27497 is severe for organizations using n8n for workflow automation. Successful exploitation allows attackers to execute arbitrary code and write files on the server, potentially leading to full system compromise. This can result in unauthorized data access, data manipulation, disruption of automated processes, deployment of persistent malware, and lateral movement within the network. Since n8n often integrates with various enterprise systems and services, the compromise can cascade, affecting broader IT infrastructure and business operations. The vulnerability undermines confidentiality, integrity, and availability, posing risks to sensitive data and critical automation workflows. Organizations relying on n8n for business-critical automation, especially in regulated industries or those with sensitive data, face heightened risks of operational disruption and data breaches. The ease of exploitation by any authenticated user with workflow modification rights increases insider threat risks and the impact of compromised credentials.
Mitigation Recommendations
To mitigate CVE-2026-27497, organizations should immediately upgrade n8n to versions 2.10.1, 2.9.3, or 1.123.22 or later, where the vulnerability is fully patched. Until upgrades can be applied, restrict workflow creation and editing permissions strictly to fully trusted and vetted users to reduce the attack surface. Additionally, disable the Merge node by adding 'n8n-nodes-base.merge' to the NODES_EXCLUDE environment variable to prevent exploitation via the vulnerable node, understanding this is a temporary measure and does not fully eliminate risk. Implement strong authentication and monitoring for accounts with workflow modification privileges to detect suspicious activity. Employ network segmentation to isolate n8n servers from critical infrastructure and sensitive data stores. Regularly audit workflows for unauthorized changes and review logs for anomalous behavior. Finally, maintain an incident response plan tailored to automation platform compromises to quickly contain and remediate potential breaches.
Affected Countries
United States, Germany, United Kingdom, Netherlands, Australia, Canada, France, Japan, India, Brazil
CVE-2026-27497: CWE-94: Improper Control of Generation of Code ('Code Injection') in n8n-io n8n
Description
n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could leverage the Merge node's SQL query mode to execute arbitrary code and write arbitrary files on the n8n server. The issues have been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to one of these versions or later to remediate all known vulnerabilities. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Limit workflow creation and editing permissions to fully trusted users only, and/or disable the Merge node by adding `n8n-nodes-base.merge` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27497 is a critical vulnerability classified under CWE-94 (Improper Control of Generation of Code) and CWE-89 (SQL Injection) affecting the open-source workflow automation platform n8n. The flaw exists in the Merge node's SQL query mode, which improperly handles user input, allowing an authenticated user with permissions to create or modify workflows to inject and execute arbitrary code on the n8n server. This capability extends to writing arbitrary files, enabling attackers to potentially deploy backdoors, manipulate workflows, or disrupt operations. Exploitation requires authentication but no additional user interaction, making it highly accessible to insiders or compromised accounts. The vulnerability affects multiple version ranges: all versions prior to 1.123.22, versions from 2.0.0 up to but not including 2.9.3, and versions 2.10.0 up to but not including 2.10.1. The vendor has addressed the issue in versions 2.10.1, 2.9.3, and 1.123.22. The CVSS 4.0 base score of 9.4 indicates a critical severity with network attack vector, low attack complexity, no privileges required beyond workflow modification rights, and no user interaction needed. The vulnerability's scope is high as it impacts confidentiality, integrity, and availability of the affected systems. Temporary mitigations include restricting workflow creation and editing permissions to fully trusted users and disabling the Merge node by excluding it via the NODES_EXCLUDE environment variable, though these are not complete fixes. No known exploits in the wild have been reported yet, but the severity and ease of exploitation make timely patching imperative.
Potential Impact
The impact of CVE-2026-27497 is severe for organizations using n8n for workflow automation. Successful exploitation allows attackers to execute arbitrary code and write files on the server, potentially leading to full system compromise. This can result in unauthorized data access, data manipulation, disruption of automated processes, deployment of persistent malware, and lateral movement within the network. Since n8n often integrates with various enterprise systems and services, the compromise can cascade, affecting broader IT infrastructure and business operations. The vulnerability undermines confidentiality, integrity, and availability, posing risks to sensitive data and critical automation workflows. Organizations relying on n8n for business-critical automation, especially in regulated industries or those with sensitive data, face heightened risks of operational disruption and data breaches. The ease of exploitation by any authenticated user with workflow modification rights increases insider threat risks and the impact of compromised credentials.
Mitigation Recommendations
To mitigate CVE-2026-27497, organizations should immediately upgrade n8n to versions 2.10.1, 2.9.3, or 1.123.22 or later, where the vulnerability is fully patched. Until upgrades can be applied, restrict workflow creation and editing permissions strictly to fully trusted and vetted users to reduce the attack surface. Additionally, disable the Merge node by adding 'n8n-nodes-base.merge' to the NODES_EXCLUDE environment variable to prevent exploitation via the vulnerable node, understanding this is a temporary measure and does not fully eliminate risk. Implement strong authentication and monitoring for accounts with workflow modification privileges to detect suspicious activity. Employ network segmentation to isolate n8n servers from critical infrastructure and sensitive data stores. Regularly audit workflows for unauthorized changes and review logs for anomalous behavior. Finally, maintain an incident response plan tailored to automation platform compromises to quickly contain and remediate potential breaches.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-19T19:46:03.542Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699f7a9cb7ef31ef0b62e4d9
Added to database: 2/25/2026, 10:41:32 PM
Last enriched: 3/5/2026, 10:02:26 AM
Last updated: 4/12/2026, 12:52:47 AM
Views: 432
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.