n8n Flaws Let Authenticated Users Achieve Remote RCE Exposed

High-severity sandbox-escape vulnerabilities in n8n (CVE-2026-1470, CVE-2026-0863) allow authenticated RCE via JavaScript and Python; upgrade to patched releases and avoid internal task execution.

  • n8n contains two Sandbox-escape flaws that can lead to remote code execution for authenticated users.
  • One issue, CVE-2026-1470, scores 9.9 and targets the JavaScript Expression sandbox.
  • CVE-2026-0863 scores 8.5 and bypasses the python-task-executor sandbox to run Python code.
  • Users should upgrade to patched releases listed by the vendor and avoid running in internal task-execution mode; guidance is in the Hosting/configuration/task-runners/”>task runners documentation.

JFrog Security researchers disclosed two new vulnerabilities in the n8n workflow automation platform on Jan. 28, 2026, that allow authenticated users to escape sandboxing and execute code on host systems, including in some internal execution setups. The issues were reported with high severity and detailed in a technical write-up by JFrog Security Research.

- Advertisement -

The first flaw, CVE-2026-1470, is an eval injection in the JavaScript Expression sandbox with a CVSS score of 9.9. An authenticated attacker can submit crafted JavaScript that bypasses the Expression sandbox mechanism and achieve remote code execution on the main n8n node.

The second flaw, CVE-2026-0863, is an eval injection against the python-task-executor sandbox with a CVSS score of 8.5. This vulnerability can let an authenticated user run arbitrary Python on the underlying operating system.

“As n8n spans an entire organization to automate AI workflows, it holds the keys to core tools, functions, and data from infrastructure, including LLM APIs, sales data, and internal IAM systems, among others,” JFrog wrote in its disclosure. The vendor warned that sandbox escapes can effectively give an attacker broad access.

Patches are available; affected users are advised to upgrade to the fixed releases. For CVE-2026-1470 install 1.123.17, 2.4.5, or 2.5.1. For CVE-2026-0863 install 1.123.14, 2.3.5, or 2.4.2.

- Advertisement -

“These vulnerabilities highlight how difficult it is to safely sandbox dynamic, high‑level languages such as JavaScript and Python,” said researcher Nathan Nehorai. “In this case, deprecated or rarely used constructs, combined with interpreter changes and exception handling behavior, were enough to break out of otherwise restrictive sandboxes and achieve remote code execution.”

The disclosure follows another maximum-severity n8n flaw (CVE-2026-21858, “Ni8mare”) reported weeks earlier. Users should review task-runner configuration and apply updates promptly; n8n documentation recommends using external execution mode for production.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

OpenClaw AI Assistant Patched for Critical 1-Click RCE Flaw

A critical flaw in the popular AI assistant OpenClaw allows attackers to execute remote...

China executes 4 in Myanmar-based crime family crackdown

Four leading members of the Bai family, a powerful Myanmar-based crime syndicate overseeing 41...

Bitcoin’s Bull Market Hope Fades as $74K Support Tested

Bitcoin is struggling to avoid a fresh price decline as market sentiment turns increasingly...

Tesla Shares Dip as Europe Registrations Plunge

Tesla's new vehicle registrations plummeted 42% in France and 88% in Norway for January...

MicroStrategy Buys $75M in BTC as Stock Falls

MicroStrategy added 855 Bitcoin last week, a smaller-than-usual purchase funded by selling common stock.The...
- Advertisement -

Must Read

What is Moon Tropica (CAH) – Technology, Tokenomics, Game Preview

Gaming enthusiasts and crypto enthusiasts, hHave you heard about Moon Tropica? If you're longing for that nostalgic feel of classic games from your childhood...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!