CVE-2026-27577: CWE-94: Improper Control of Generation of Code ('Code Injection') in n8n-io n8n
n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, additional exploits in the expression evaluation of n8n have been identified and patched following CVE-2025-68613. An authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. The issues have been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to one of these versions or later to remediate all known vulnerabilities. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Limit workflow creation and editing permissions to fully trusted users only, and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
AI Analysis
Technical Summary
CVE-2026-27577 is a critical vulnerability in the open-source workflow automation platform n8n that allows authenticated users with permissions to create or modify workflows to perform code injection attacks via crafted expressions in workflow parameters. The root cause is improper control over code generation during expression evaluation, categorized under CWE-94. This flaw enables attackers to execute arbitrary system commands on the host machine running n8n, potentially leading to full system compromise, data theft, or disruption of services. The vulnerability affects multiple n8n versions prior to 1.123.22, 2.9.3, and 2.10.1, with patches released in these versions. Exploitation requires authentication but no additional user interaction, and the attack complexity is low, making it a significant risk in environments where multiple users have workflow editing rights. The vulnerability was identified following earlier related issues (CVE-2025-68613), indicating ongoing challenges in securing expression evaluation in n8n. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) highlights network attack vector, low complexity, no attack or user interaction needed, and high impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported yet, but the severity and nature of the flaw warrant immediate attention. Temporary mitigations include restricting workflow creation and editing permissions to fully trusted users and deploying n8n in hardened environments with restricted OS privileges and network segmentation to limit potential damage. However, these are stopgap measures until upgrades can be applied.
Potential Impact
The impact of CVE-2026-27577 is severe for organizations using n8n as a workflow automation platform. Successful exploitation allows an authenticated user with workflow editing permissions to execute arbitrary system commands on the host, potentially leading to full system compromise. This can result in unauthorized data access or exfiltration, disruption or destruction of workflows and data, lateral movement within the network, and deployment of further malware or ransomware. Given n8n’s role in automating business-critical processes, such compromise could disrupt operations, cause data breaches, and damage organizational reputation. The vulnerability’s network accessibility and low attack complexity increase the risk of exploitation in multi-user environments or where user credentials are compromised. Organizations relying on n8n in production environments, especially those with multiple collaborators or less restrictive access controls, face heightened risk. The lack of known exploits in the wild currently reduces immediate threat but does not diminish the urgency for remediation due to the critical nature of the vulnerability.
Mitigation Recommendations
To mitigate CVE-2026-27577, organizations should prioritize upgrading n8n to versions 1.123.22, 2.9.3, 2.10.1, or later, where the vulnerability is patched. Until upgrades are feasible, restrict workflow creation and modification permissions strictly to fully trusted and vetted users to reduce the attack surface. Deploy n8n instances in hardened environments with minimal operating system privileges, employing containerization or sandboxing to limit the impact of potential exploitation. Implement network segmentation and firewall rules to restrict inbound and outbound traffic from the n8n host, minimizing lateral movement opportunities. Enable robust authentication mechanisms such as multi-factor authentication (MFA) for all users with elevated permissions. Regularly audit workflow definitions and user activities for suspicious or unauthorized changes. Monitor system logs and network traffic for anomalous command execution patterns indicative of exploitation attempts. Finally, maintain up-to-date backups of workflows and system configurations to enable recovery in case of compromise.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, Netherlands, Japan, South Korea, India
CVE-2026-27577: CWE-94: Improper Control of Generation of Code ('Code Injection') in n8n-io n8n
Description
n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, additional exploits in the expression evaluation of n8n have been identified and patched following CVE-2025-68613. An authenticated user with permission to create or modify workflows could abuse crafted expressions in workflow parameters to trigger unintended system command execution on the host running n8n. The issues have been fixed in n8n versions 2.10.1, 2.9.3, and 1.123.22. Users should upgrade to one of these versions or later to remediate all known vulnerabilities. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Limit workflow creation and editing permissions to fully trusted users only, and/or deploy n8n in a hardened environment with restricted operating system privileges and network access to reduce the impact of potential exploitation. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27577 is a critical vulnerability in the open-source workflow automation platform n8n that allows authenticated users with permissions to create or modify workflows to perform code injection attacks via crafted expressions in workflow parameters. The root cause is improper control over code generation during expression evaluation, categorized under CWE-94. This flaw enables attackers to execute arbitrary system commands on the host machine running n8n, potentially leading to full system compromise, data theft, or disruption of services. The vulnerability affects multiple n8n versions prior to 1.123.22, 2.9.3, and 2.10.1, with patches released in these versions. Exploitation requires authentication but no additional user interaction, and the attack complexity is low, making it a significant risk in environments where multiple users have workflow editing rights. The vulnerability was identified following earlier related issues (CVE-2025-68613), indicating ongoing challenges in securing expression evaluation in n8n. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H) highlights network attack vector, low complexity, no attack or user interaction needed, and high impact on confidentiality, integrity, and availability. No known exploits in the wild have been reported yet, but the severity and nature of the flaw warrant immediate attention. Temporary mitigations include restricting workflow creation and editing permissions to fully trusted users and deploying n8n in hardened environments with restricted OS privileges and network segmentation to limit potential damage. However, these are stopgap measures until upgrades can be applied.
Potential Impact
The impact of CVE-2026-27577 is severe for organizations using n8n as a workflow automation platform. Successful exploitation allows an authenticated user with workflow editing permissions to execute arbitrary system commands on the host, potentially leading to full system compromise. This can result in unauthorized data access or exfiltration, disruption or destruction of workflows and data, lateral movement within the network, and deployment of further malware or ransomware. Given n8n’s role in automating business-critical processes, such compromise could disrupt operations, cause data breaches, and damage organizational reputation. The vulnerability’s network accessibility and low attack complexity increase the risk of exploitation in multi-user environments or where user credentials are compromised. Organizations relying on n8n in production environments, especially those with multiple collaborators or less restrictive access controls, face heightened risk. The lack of known exploits in the wild currently reduces immediate threat but does not diminish the urgency for remediation due to the critical nature of the vulnerability.
Mitigation Recommendations
To mitigate CVE-2026-27577, organizations should prioritize upgrading n8n to versions 1.123.22, 2.9.3, 2.10.1, or later, where the vulnerability is patched. Until upgrades are feasible, restrict workflow creation and modification permissions strictly to fully trusted and vetted users to reduce the attack surface. Deploy n8n instances in hardened environments with minimal operating system privileges, employing containerization or sandboxing to limit the impact of potential exploitation. Implement network segmentation and firewall rules to restrict inbound and outbound traffic from the n8n host, minimizing lateral movement opportunities. Enable robust authentication mechanisms such as multi-factor authentication (MFA) for all users with elevated permissions. Regularly audit workflow definitions and user activities for suspicious or unauthorized changes. Monitor system logs and network traffic for anomalous command execution patterns indicative of exploitation attempts. Finally, maintain up-to-date backups of workflows and system configurations to enable recovery in case of compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-20T17:40:28.449Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699f7a9cb7ef31ef0b62e4df
Added to database: 2/25/2026, 10:41:32 PM
Last enriched: 3/5/2026, 10:00:50 AM
Last updated: 4/11/2026, 7:53:53 PM
Views: 273
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.