PT-2026-1662 · N8N · N8N
Dorattias
·
Published
2026-01-07
·
Updated
2026-03-04
·
CVE-2026-21858
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N |
Name of the Vulnerable Software and Affected Versions
n8n versions 1.65.0 through 1.120.4
Description
n8n, an open-source workflow automation platform, is affected by a critical vulnerability (CVE-2026-21858) that allows unauthenticated remote code execution (RCE). This flaw stems from a content-type confusion issue in the handling of form-based webhooks. An attacker can exploit this by sending a crafted request, bypassing authentication and gaining access to arbitrary files on the underlying server. This access can lead to the exposure of sensitive information, including database credentials and API keys, and potentially enable full system compromise. The vulnerability allows attackers to forge admin sessions and execute commands. As of January 9, 2026, over 100,000 instances were reported as potentially vulnerable, with active scanning and exploitation attempts observed. The vulnerability is particularly dangerous because n8n often manages credentials for various services, making a compromised instance a significant risk.
Recommendations
Upgrade to n8n version 1.121.0 or later immediately. As a temporary mitigation, restrict or disable publicly accessible webhook and form endpoints until the upgrade is completed. Rotate all credentials and API keys if a compromise is suspected.
Exploit
Fix
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
BDU:2026-00126
CVE-2026-21858
GHSA-V4PR-FM98-W9PG
Affected Products
N8N
References · 229
- 🔥 https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/21xxx/CVE-2026-21858.json⭐ 2424 🔗 550 · Exploit
- 🔥 https://github.com/Chocapikk/CVE-2026-21858⭐ 90 🔗 24 · Exploit
- 🔥 https://cyera.com/research-labs/ni8mare-unauthenticated-remote-code-execution-in-n8n-cve-2026-21858 · Exploit
- https://github.com/n8n-io/n8n/security/advisories/GHSA-v4pr-fm98-w9pg⭐ 171700 🔗 54195 · Vendor Advisory
- https://osv.dev/vulnerability/CVE-2026-21858 · Vendor Advisory
- https://bdu.fstec.ru/vul/2026-00126 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2026-21858 · Security Note
- https://osv.dev/vulnerability/GHSA-v4pr-fm98-w9pg · Vendor Advisory
- https://github.com/n8n-io/n8n⭐ 172017 🔗 54278 · Note
- https://t.me/proxy_bar/3054 · Telegram Post
- https://twitter.com/TweetThreatNews/status/2009241222330630484 · Twitter Post
- https://twitter.com/ox0ffff/status/2009276722403787135 · Twitter Post
- https://twitter.com/AISecHub/status/2008996010035654800 · Twitter Post
- https://twitter.com/UndercodeNews/status/2009223936777834781 · Twitter Post
- https://reddit.com/r/SecOpsDaily/comments/1q8h2q0/secopsdaily_20260109_roundup · Reddit Post