PT-2026-1583 · N8N · N8N

Theolelasseux

·

Published

2026-01-07

·

Updated

2026-01-08

·

CVE-2026-21877

CVSS v3.1
9.9
VectorAV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions n8n versions 0.123.0 through 1.121.2
Description n8n, an open source workflow automation platform, contains a critical authenticated Remote Code Execution (RCE) flaw (CVE-2026-21877). A successful exploit allows an authenticated user to execute untrusted code, potentially leading to full compromise of the instance. This impacts both self-hosted and n8n Cloud deployments. The issue stems from arbitrary file write and untrusted input handling, specifically related to the Git node. The vulnerability has a CVSS score of 10.0, indicating maximum severity. Compromised n8n instances could expose API credentials, OAuth tokens, database connections, and cloud storage.
Recommendations Upgrade to n8n version 1.121.3 or later. If patching is not immediately possible, disable the Git node. Restrict access for untrusted users.

Fix

RCE

Code Injection

Unrestricted File Upload

Weakness Enumeration

Related Identifiers

CVE-2026-21877

Affected Products

N8N