PT-2026-4918 · N8N · N8N
Natan Nehorai
·
Published
2026-01-27
·
Updated
2026-01-30
·
CVE-2026-1470
CVSS v3.1
9.9
9.9
Critical
| Base vector | Vector | AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H |
n8n and Affected Versions
n8n (affected versions not specified)
Description
n8n is affected by a critical Remote Code Execution (RCE) issue within its workflow Expression evaluation system. Authenticated users who supply expressions during workflow configuration may be able to execute arbitrary code in a context that lacks sufficient isolation from the underlying runtime. An attacker could exploit this to execute code with the privileges of the n8n process, potentially leading to a full compromise of the instance, including unauthorized data access, workflow modification, and system-level operations. Reports indicate approximately 599,000 to 981,000 potentially exposed instances. The issue stems from an eval injection vulnerability that allows bypassing the Expression sandbox. The vulnerability is identified as CVE-2026-1470 and has a CVSS score of 9.9.
Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
RCE
Eval Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Weakness Enumeration
Related Identifiers
CVE-2026-1470
GHSA-5XRP-6693-JJX9
Affected Products
N8N
References · 36
- https://github.com/n8n-io/n8n/commit/aa4d1e5825829182afa0ad5b81f602638f55fa04⭐ 171567 🔗 54171 · Patch
- https://osv.dev/vulnerability/CVE-2026-1470 · Vendor Advisory
- https://nvd.nist.gov/vuln/detail/CVE-2026-1470 · Security Note
- https://osv.dev/vulnerability/GHSA-5xrp-6693-jjx9 · Vendor Advisory
- https://github.com/n8n-io/n8n/commit/30383d86139f3279a698df8d229eadfefe8627f4⭐ 172017 🔗 54278 · Note
- https://github.com/n8n-io/n8n/commit/25c4b9605b420a98d0185a4f01115122a5134d8f⭐ 172017 🔗 54278 · Note
- https://github.com/n8n-io/n8n⭐ 172017 🔗 54278 · Note
- https://twitter.com/HunterMapping/status/2016698249067798668 · Twitter Post
- https://twitter.com/fofabot/status/2016716048217887144 · Twitter Post
- https://twitter.com/CCBalert/status/2016510874781937839 · Twitter Post
- https://twitter.com/TweetThreatNews/status/2017259060626596110 · Twitter Post
- https://twitter.com/zerodaywire/status/2016514853561643058 · Twitter Post
- https://twitter.com/ThreatSynop/status/2016506480568996105 · Twitter Post
- https://twitter.com/piedpiper1616/status/2016737994414444564 · Twitter Post
- https://twitter.com/TweetThreatNews/status/2016949555858743499 · Twitter Post