Two High-Severity n8n Flaws Allow Authenticated Remote Code Execution
Overview
Researchers from JFrog Security Research have identified two significant vulnerabilities in the n8n workflow automation platform. The most critical issue, tracked as CVE-2026-1470, has a CVSS score of 9.9 and involves an eval injection vulnerability that allows authenticated users to execute arbitrary code remotely. This flaw poses a severe risk, as it could potentially enable attackers to manipulate the system and access sensitive data. Users of n8n should take immediate action to secure their installations, especially those who rely on this platform for workflow automation. Prompt updates and monitoring are essential to mitigate risks associated with these vulnerabilities.
Key Takeaways
- Affected Systems: n8n workflow automation platform, versions not specified
- Action Required: Users should update to the latest version of n8n to patch the vulnerabilities.
- Timeline: Newly disclosed
Original Article Summary
Cybersecurity researchers have disclosed two new security flaws in the n8n workflow automation platform, including a crucial vulnerability that could result in remote code execution. The weaknesses, discovered by the JFrog Security Research team, are listed below - CVE-2026-1470 (CVSS score: 9.9) - An eval injection vulnerability that could allow an authenticated user to bypass the Expression
Impact
n8n workflow automation platform, versions not specified
Exploitation Status
No active exploitation has been reported at this time. However, organizations should still apply patches promptly as proof-of-concept code may exist.
Timeline
Newly disclosed
Remediation
Users should update to the latest version of n8n to patch the vulnerabilities. Regularly review user permissions and limit access to the system to reduce risk.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.
Related Topics: This incident relates to CVE, Vulnerability, Critical.