PT-2026-1583 · N8N · N8N

Theolelasseux

·

Published

2026-01-06

·

Updated

2026-02-09

·

CVE-2026-21877

CVSS v3.1
9.9
VectorAV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions n8n versions 0.121.2 through 1.121.2 n8n versions 0.123.0 through 1.121.3
Description n8n, an open-source workflow automation platform, is affected by a critical authenticated Remote Code Execution (RCE) vulnerability (CVE-2026-21877). A successful exploit allows an authenticated user to execute untrusted code, potentially leading to a full compromise of the instance, impacting both self-hosted and n8n Cloud deployments. The vulnerability stems from arbitrary file write and unsafe handling of input. The Git node is specifically identified as a potential entry point for exploitation. The issue has been resolved in version 1.121.3.
Recommendations Upgrade to n8n version 1.121.3 or later. Disable the Git node if upgrading is not immediately possible. Limit access for untrusted users.

Exploit

Fix

RCE

Unrestricted File Upload

Code Injection

Weakness Enumeration

Related Identifiers

BDU:2026-00916
CVE-2026-21877
GHSA-V364-RW7M-3263

Affected Products

N8N