PT-2026-1662 · N8N · N8N
Dorattias
·
Published
2026-01-07
·
Updated
2026-01-13
·
CVE-2026-21858
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N |
Name of the Vulnerable Software and Affected Versions
n8n versions prior to 1.121.0
Description
n8n is an open-source workflow automation platform vulnerable to a critical issue allowing unauthenticated remote code execution (RCE). This flaw, dubbed “Ni8mare” (CVE-2026-21858), stems from a content-type confusion vulnerability in the handling of webhooks and form-based workflows. Attackers can exploit this to read arbitrary files on the underlying server, potentially exposing sensitive information like API keys, database credentials, and OAuth tokens. Successful exploitation can lead to full system compromise, including the ability to forge admin sessions and execute arbitrary commands. Approximately 60,000 internet-exposed instances were initially identified as vulnerable, though this number has decreased with patching. A public proof-of-concept exploit is available, increasing the risk of active exploitation.
Recommendations
Upgrade to n8n version 1.121.0 or later immediately.
Restrict access to publicly accessible webhooks and form endpoints as a temporary mitigation if an immediate upgrade is not possible.
Rotate all API keys and secrets if you suspect your instance may have been compromised.
Exploit
Fix
RCE
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
BDU:2026-00126
CVE-2026-21858
Affected Products
N8N
References · 170
- 🔥 https://github.com/Chocapikk/CVE-2026-21858⭐ 90 🔗 24 · Exploit
- https://bdu.fstec.ru/vul/2026-00126 · Security Note
- https://nvd.nist.gov/vuln/detail/CVE-2026-21858 · Security Note
- https://github.com/n8n-io/n8n/security/advisories/GHSA-v4pr-fm98-w9pg⭐ 167307 🔗 53239 · Note
- https://twitter.com/orcasec/status/2008995666387980574 · Twitter Post
- https://twitter.com/censysio/status/2009049447125143727 · Twitter Post
- https://twitter.com/NovaSignal/status/2008953418317222050 · Twitter Post
- https://twitter.com/EduardKovacs/status/2009251788545814740 · Twitter Post
- https://twitter.com/ThreatSynop/status/2010983728651088031 · Twitter Post
- https://twitter.com/0dayPublishing/status/2009055178331218150 · Twitter Post
- https://twitter.com/PurpleOps_io/status/2010985632156238211 · Twitter Post
- https://twitter.com/wvipersg/status/2009184220556468481 · Twitter Post
- https://twitter.com/TweetThreatNews/status/2009497911390793749 · Twitter Post
- https://twitter.com/ThreatSynop/status/2011037850033078750 · Twitter Post
- https://twitter.com/TheHackersNews/status/2008899872997646557 · Twitter Post