n8n Flaws Let Authenticated Users Achieve Remote RCE Exposed

High-severity sandbox-escape vulnerabilities in n8n (CVE-2026-1470, CVE-2026-0863) allow authenticated RCE via JavaScript and Python; upgrade to patched releases and avoid internal task execution.

  • n8n contains two Sandbox-escape flaws that can lead to remote code execution for authenticated users.
  • One issue, CVE-2026-1470, scores 9.9 and targets the JavaScript Expression sandbox.
  • CVE-2026-0863 scores 8.5 and bypasses the python-task-executor sandbox to run Python code.
  • Users should upgrade to patched releases listed by the vendor and avoid running in internal task-execution mode; guidance is in the Hosting/configuration/task-runners/”>task runners documentation.

JFrog Security researchers disclosed two new vulnerabilities in the n8n workflow automation platform on Jan. 28, 2026, that allow authenticated users to escape sandboxing and execute code on host systems, including in some internal execution setups. The issues were reported with high severity and detailed in a technical write-up by JFrog Security Research.

- Advertisement -

The first flaw, CVE-2026-1470, is an eval injection in the JavaScript Expression sandbox with a CVSS score of 9.9. An authenticated attacker can submit crafted JavaScript that bypasses the Expression sandbox mechanism and achieve remote code execution on the main n8n node.

The second flaw, CVE-2026-0863, is an eval injection against the python-task-executor sandbox with a CVSS score of 8.5. This vulnerability can let an authenticated user run arbitrary Python on the underlying operating system.

“As n8n spans an entire organization to automate AI workflows, it holds the keys to core tools, functions, and data from infrastructure, including LLM APIs, sales data, and internal IAM systems, among others,” JFrog wrote in its disclosure. The vendor warned that sandbox escapes can effectively give an attacker broad access.

Patches are available; affected users are advised to upgrade to the fixed releases. For CVE-2026-1470 install 1.123.17, 2.4.5, or 2.5.1. For CVE-2026-0863 install 1.123.14, 2.3.5, or 2.4.2.

- Advertisement -

“These vulnerabilities highlight how difficult it is to safely sandbox dynamic, high‑level languages such as JavaScript and Python,” said researcher Nathan Nehorai. “In this case, deprecated or rarely used constructs, combined with interpreter changes and exception handling behavior, were enough to break out of otherwise restrictive sandboxes and achieve remote code execution.”

The disclosure follows another maximum-severity n8n flaw (CVE-2026-21858, “Ni8mare”) reported weeks earlier. Users should review task-runner configuration and apply updates promptly; n8n documentation recommends using external execution mode for production.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Curve Founder Says Disagreements Signal a Healthy, Active DAO

Disagreements signal an engaged community and prevent governance apathy, according to Curve Finance founder...

XRP’s “Boring” Phase a Hidden Blessing, Say Analysts

Ripple (XRP) is trading near cycle lows at approximately $1.4, down 47% from its...

At ETH Denver, Web3 Leaders Admit Apps Are “Epically Bad”

Industry leaders criticize Web3 for failing to build usable consumer products despite a decade...

Bitcoin Odds: 88% Chance of Higher Prices by 2027

An informal metric tracking Bitcoin's past monthly performance gives an 88% probability of BTC...

Russia Pursues BRICS and INSTC to Dodge Sanctions

Russia is pursuing the BRICS Bridge, a blockchain-based CBDC platform, to bypass Western sanctions...

Must Read

8 Best Crypto Debit Cards For Spending Your Digital Tokens

What are | How we chose | Best crypto debit cards | Binance Card? | FAQ | Final WordsCrypto debit cards have transformed how...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!