CVE-2026-27578: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in n8n-io n8n
n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could inject arbitrary scripts into pages rendered by the n8n application using different techniques on various nodes (Form Trigger node, Chat Trigger node, Send & Wait node, Webhook Node, and Chat Node). Scripts injected by a malicious workflow execute in the browser of any user who visits the affected page, enabling session hijacking and account takeover. The issues have been fixed in n8n versions 2.10.1 and 1.123.21. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Limit workflow creation and editing permissions to fully trusted users only, and/or disable the Webhook node by adding `n8n-nodes-base.webhook` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
AI Analysis
Technical Summary
CVE-2026-27578 is a cross-site scripting (XSS) vulnerability classified under CWE-80 and CWE-79 affecting the n8n workflow automation platform. The flaw exists in versions prior to 2.10.1, 2.9.3, and 1.123.22, where authenticated users with permissions to create or modify workflows can inject arbitrary JavaScript code into pages rendered by the n8n web application. This injection can occur through multiple nodes such as the Form Trigger node, Chat Trigger node, Send & Wait node, Webhook node, and Chat node. When other users visit these affected pages, the injected scripts execute in their browsers, potentially allowing attackers to hijack sessions, steal authentication tokens, or perform actions on behalf of the victim, leading to account takeover. The vulnerability arises from improper neutralization of script-related HTML tags, allowing malicious payloads to bypass input sanitization. Exploitation requires the attacker to have at least limited privileges (workflow creation/modification) and some user interaction (visiting the affected page). The vulnerability has a CVSS 4.0 base score of 8.5, indicating high severity due to network attack vector, low attack complexity, no privileges required beyond workflow editing, and high impact on confidentiality and integrity. The issue has been remediated in n8n versions 2.10.1 and 1.123.21. Until upgrades can be applied, administrators are advised to restrict workflow editing permissions to fully trusted users and disable the Webhook node via environment variable configuration. However, these mitigations do not fully remove the risk, emphasizing the need for prompt patching.
Potential Impact
The impact of CVE-2026-27578 is significant for organizations using vulnerable versions of n8n. Successful exploitation allows attackers to execute arbitrary scripts in the context of other users’ browsers, leading to session hijacking and account takeover. This compromises confidentiality by exposing sensitive session tokens and potentially other data accessible through the web interface. Integrity is impacted as attackers can perform unauthorized actions on behalf of victims, such as modifying workflows or accessing restricted data. Availability is less directly affected but could be impacted if attackers disrupt workflows or perform malicious actions. Since n8n is often used to automate critical business processes, exploitation could lead to disruption of automated workflows, data leakage, and lateral movement within an organization’s infrastructure. The requirement for authenticated access limits exposure but does not eliminate risk, especially in environments with many users or delegated permissions. Organizations relying on n8n for automation in sectors like finance, healthcare, and technology could face operational and reputational damage if exploited.
Mitigation Recommendations
To mitigate CVE-2026-27578, organizations should immediately upgrade n8n to versions 2.10.1, 2.9.3, or 1.123.22 or later where the vulnerability is patched. Until upgrades are feasible, restrict workflow creation and modification permissions strictly to fully trusted and vetted users to reduce the risk of malicious script injection. Additionally, disable the Webhook node by adding `n8n-nodes-base.webhook` to the `NODES_EXCLUDE` environment variable to limit attack vectors, though this is only a partial mitigation. Implement strict monitoring and auditing of workflow changes to detect suspicious activity. Employ Content Security Policy (CSP) headers to reduce the impact of injected scripts. Educate users to avoid clicking on suspicious links or workflows. Regularly review user permissions and remove unnecessary workflow editing rights. Finally, maintain up-to-date backups of workflows and configurations to enable recovery in case of compromise.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, India, Brazil
CVE-2026-27578: CWE-80: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in n8n-io n8n
Description
n8n is an open source workflow automation platform. Prior to versions 2.10.1, 2.9.3, and 1.123.22, an authenticated user with permission to create or modify workflows could inject arbitrary scripts into pages rendered by the n8n application using different techniques on various nodes (Form Trigger node, Chat Trigger node, Send & Wait node, Webhook Node, and Chat Node). Scripts injected by a malicious workflow execute in the browser of any user who visits the affected page, enabling session hijacking and account takeover. The issues have been fixed in n8n versions 2.10.1 and 1.123.21. Users should upgrade to one of these versions or later to remediate the vulnerability. If upgrading is not immediately possible, administrators should consider the following temporary mitigations. Limit workflow creation and editing permissions to fully trusted users only, and/or disable the Webhook node by adding `n8n-nodes-base.webhook` to the `NODES_EXCLUDE` environment variable. These workarounds do not fully remediate the risk and should only be used as short-term mitigation measures.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-27578 is a cross-site scripting (XSS) vulnerability classified under CWE-80 and CWE-79 affecting the n8n workflow automation platform. The flaw exists in versions prior to 2.10.1, 2.9.3, and 1.123.22, where authenticated users with permissions to create or modify workflows can inject arbitrary JavaScript code into pages rendered by the n8n web application. This injection can occur through multiple nodes such as the Form Trigger node, Chat Trigger node, Send & Wait node, Webhook node, and Chat node. When other users visit these affected pages, the injected scripts execute in their browsers, potentially allowing attackers to hijack sessions, steal authentication tokens, or perform actions on behalf of the victim, leading to account takeover. The vulnerability arises from improper neutralization of script-related HTML tags, allowing malicious payloads to bypass input sanitization. Exploitation requires the attacker to have at least limited privileges (workflow creation/modification) and some user interaction (visiting the affected page). The vulnerability has a CVSS 4.0 base score of 8.5, indicating high severity due to network attack vector, low attack complexity, no privileges required beyond workflow editing, and high impact on confidentiality and integrity. The issue has been remediated in n8n versions 2.10.1 and 1.123.21. Until upgrades can be applied, administrators are advised to restrict workflow editing permissions to fully trusted users and disable the Webhook node via environment variable configuration. However, these mitigations do not fully remove the risk, emphasizing the need for prompt patching.
Potential Impact
The impact of CVE-2026-27578 is significant for organizations using vulnerable versions of n8n. Successful exploitation allows attackers to execute arbitrary scripts in the context of other users’ browsers, leading to session hijacking and account takeover. This compromises confidentiality by exposing sensitive session tokens and potentially other data accessible through the web interface. Integrity is impacted as attackers can perform unauthorized actions on behalf of victims, such as modifying workflows or accessing restricted data. Availability is less directly affected but could be impacted if attackers disrupt workflows or perform malicious actions. Since n8n is often used to automate critical business processes, exploitation could lead to disruption of automated workflows, data leakage, and lateral movement within an organization’s infrastructure. The requirement for authenticated access limits exposure but does not eliminate risk, especially in environments with many users or delegated permissions. Organizations relying on n8n for automation in sectors like finance, healthcare, and technology could face operational and reputational damage if exploited.
Mitigation Recommendations
To mitigate CVE-2026-27578, organizations should immediately upgrade n8n to versions 2.10.1, 2.9.3, or 1.123.22 or later where the vulnerability is patched. Until upgrades are feasible, restrict workflow creation and modification permissions strictly to fully trusted and vetted users to reduce the risk of malicious script injection. Additionally, disable the Webhook node by adding `n8n-nodes-base.webhook` to the `NODES_EXCLUDE` environment variable to limit attack vectors, though this is only a partial mitigation. Implement strict monitoring and auditing of workflow changes to detect suspicious activity. Employ Content Security Policy (CSP) headers to reduce the impact of injected scripts. Educate users to avoid clicking on suspicious links or workflows. Regularly review user permissions and remove unnecessary workflow editing rights. Finally, maintain up-to-date backups of workflows and configurations to enable recovery in case of compromise.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-02-20T17:40:28.449Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 699f7e1fb7ef31ef0b65d5a3
Added to database: 2/25/2026, 10:56:31 PM
Last enriched: 3/5/2026, 10:01:09 AM
Last updated: 4/12/2026, 12:00:45 PM
Views: 98
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.