PT-2026-22028 · N8N · N8N

Eilonc-Pillar

·

Published

2026-02-25

·

Updated

2026-04-14

·

CVE-2026-27493

CVSS v4.0

9.5

Critical

AV:N/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
Name of the Vulnerable Software and Affected Versions n8n versions prior to 2.10.1 n8n versions prior to 2.9.3 n8n versions prior to 1.123.22
Description A second-order expression injection exists in Form nodes. This allows an unauthenticated attacker to inject and evaluate arbitrary expressions by submitting crafted form data. If combined with an expression sandbox escape, this can lead to remote code execution on the host. Exploitation requires a specific configuration where a form node field interpolates a value from an unauthenticated user and the field value begins with an = character, triggering a double-evaluation of the content.
Recommendations Update to version 2.10.1 or later. Update to version 2.9.3 or later. Update to version 1.123.22 or later. Manually review the usage of form nodes for the mentioned preconditions. Disable the Form node by adding n8n-nodes-base.form to the NODES EXCLUDE environment variable. Disable the Form Trigger node by adding n8n-nodes-base.formTrigger to the NODES EXCLUDE environment variable.

Exploit

Fix

RCE

Code Injection

Eval Injection

Weakness Enumeration

Related Identifiers

CVE-2026-27493
GHSA-75G8-RV7V-32F7

Affected Products

N8N