Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27577: CWE-94: Improper Control of Generation of Code ('Code Injection') in n8n-io n8n

0
Critical
VulnerabilityCVE-2026-27577cvecve-2026-27577cwe-94
Published: Wed Feb 25 2026 (02/25/2026, 22:19:44 UTC)
Source: CVE Database V5
Vendor/Project: n8n-io
Product: n8n

Description

n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, additional exploits in the expression evaluation of n8n have been identified and patched following CVE-2025-68613. An authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. The issues have been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to one of these versions or later to remediate all known vulnerabilities. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Limit workflow creation and editing permissions to fully trusted users only, and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 10:00:50 UTC

Technical Analysis

CVE-2026-27577 is a critical vulnerability in the open-source workflow automation platform n8n that allows authenticated users with permissions to create or modify workflows to perform code injection attacks via crafted expressions in workflow parameters. The root cause is improper control over code generation during expression evaluation, categorized under CWE-94. This flaw enables attackers to execute arbitrary system commands on the host machine running n8n, potentially leading to full system compromise, data theft, or disruption of services. The vulnerability affects multiple n8n versions prior to 1.123.22, 2.9.3, and 2.10.1, with patches released in these versions. Exploitation requires authentication but no additional user interaction, and the attack complexity is low, making it a significant risk in environments where multiple users have workflow editing rights. The vulnerability was identified following earlier related issues (CVE-2025-68613), indicating ongoing challenges in securing expression evaluation in n8n. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) highlights network attack vector, low complexity, no attack or user interaction needed, and high impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported yet, but the severity and nature of the flaw warrant immediate attention. Temporary mitigations include restricting workflow creation and editing permissions to fully trusted users and deploying n8n in hardened environments with restricted OS privileges and network segmentation to limit potential damage. However, these are stopgap measures until upgrades can be applied.

Potential Impact

The impact of CVE-2026-27577 is severe for organizations using n8n as a workflow automation platform. Successful exploitation allows an authenticated user with workflow editing permissions to execute arbitrary system commands on the host, potentially leading to full system compromise. This can result in unauthorized data access or exfiltration, disruption or destruction of workflows and data, lateral movement within the network, and deployment of further malware or ransomware. Given n8n’s role in automating business-critical processes, such compromise could disrupt operations, cause data breaches, and damage organizational reputation. The vulnerability’s network accessibility and low attack complexity increase the risk of exploitation in multi-user environments or where user credentials are compromised. Organizations relying on n8n in production environments, especially those with multiple collaborators or less restrictive access controls, face heightened risk. The lack of known exploits in the wild currently reduces immediate threat but does not diminish the urgency for remediation due to the critical nature of the vulnerability.

Mitigation Recommendations

To mitigate CVE-2026-27577, organizations should prioritize upgrading n8n to versions 1.123.22, 2.9.3, 2.10.1, or later, where the vulnerability is patched. Until upgrades are feasible, restrict workflow creation and modification permissions strictly to fully trusted and vetted users to reduce the attack surface. Deploy n8n instances in hardened environments with minimal operating system privileges, employing containerization or sandboxing to limit the impact of potential exploitation. Implement network segmentation and firewall rules to restrict inbound and outbound traffic from the n8n host, minimizing lateral movement opportunities. Enable robust authentication mechanisms such as multi-factor authentication (MFA) for all users with elevated permissions. Regularly audit workflow definitions and user activities for suspicious or unauthorized changes. Monitor system logs and network traffic for anomalous command execution patterns indicative of exploitation attempts. Finally, maintain up-to-date backups of workflows and system configurations to enable recovery in case of compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T17:40:28.449Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f7a9cb7ef31ef0b62e4df

Added to database: 2/25/2026, 10:41:32 PM

Last enriched: 3/5/2026, 10:00:50 AM

Last updated: 4/11/2026, 7:53:53 PM

Views: 273

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses