PT-2026-4918 · N8N · N8N
Natan Nehorai
·
Published
2026-01-27
·
Updated
2026-01-29
·
CVE-2026-1470
CVSS v3.1
9.9
9.9
Critical
| Base vector | Vector | AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
n8n (affected versions not specified)
Description
n8n contains a critical Remote Code Execution (RCE) issue within its workflow Expression evaluation system. An authenticated attacker can bypass the Expression sandbox and execute arbitrary code with the privileges of the n8n process. This is due to an eval injection flaw. Successful exploitation could lead to a full compromise of the affected instance, including unauthorized access to sensitive data and modification of workflows. Approximately 599,000 to 981,000 instances are potentially exposed. The issue allows authenticated users to break out of the JavaScript sandbox and execute code on the host system. The vulnerability is identified as CVE-2026-1470.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
RCE
Eval Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
CVE-2026-1470
GHSA-5XRP-6693-JJX9
Affected Products
N8N
References · 30
- https://github.com/n8n-io/n8n/commit/aa4d1e5825829182afa0ad5b81f602638f55fa04⭐ 171567 🔗 54171 · Patch
- https://nvd.nist.gov/vuln/detail/CVE-2026-1470 · Security Note
- https://osv.dev/vulnerability/CVE-2026-1470 · Vendor Advisory
- https://osv.dev/vulnerability/GHSA-5xrp-6693-jjx9 · Vendor Advisory
- https://github.com/n8n-io/n8n/commit/25c4b9605b420a98d0185a4f01115122a5134d8f⭐ 172017 🔗 54278 · Note
- https://github.com/n8n-io/n8n⭐ 172017 🔗 54278 · Note
- https://github.com/n8n-io/n8n/commit/30383d86139f3279a698df8d229eadfefe8627f4⭐ 172017 🔗 54278 · Note
- https://twitter.com/autumn_good_35/status/2016562101884768318 · Twitter Post
- https://twitter.com/zerodaywire/status/2016514853561643058 · Twitter Post
- https://twitter.com/rxerium/status/2016507425986154510 · Twitter Post
- https://twitter.com/CveFindCom/status/2016226192097980726 · Twitter Post
- https://twitter.com/992vuln992/status/2016692117528285582 · Twitter Post
- https://twitter.com/HunterMapping/status/2016698249067798668 · Twitter Post
- https://twitter.com/TweetThreatNews/status/2016806074054029633 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1qpc7yj/two_highseverity_n8n_flaws_allow_authenticated · Reddit Post