n8n Flaws Let Authenticated Users Achieve Remote RCE Exposed

High-severity sandbox-escape vulnerabilities in n8n (CVE-2026-1470, CVE-2026-0863) allow authenticated RCE via JavaScript and Python; upgrade to patched releases and avoid internal task execution.

  • n8n contains two Sandbox-escape flaws that can lead to remote code execution for authenticated users.
  • One issue, CVE-2026-1470, scores 9.9 and targets the JavaScript Expression sandbox.
  • CVE-2026-0863 scores 8.5 and bypasses the python-task-executor sandbox to run Python code.
  • Users should upgrade to patched releases listed by the vendor and avoid running in internal task-execution mode; guidance is in the Hosting/configuration/task-runners/”>task runners documentation.

JFrog Security researchers disclosed two new vulnerabilities in the n8n workflow automation platform on Jan. 28, 2026, that allow authenticated users to escape sandboxing and execute code on host systems, including in some internal execution setups. The issues were reported with high severity and detailed in a technical write-up by JFrog Security Research.

- Advertisement -

The first flaw, CVE-2026-1470, is an eval injection in the JavaScript Expression sandbox with a CVSS score of 9.9. An authenticated attacker can submit crafted JavaScript that bypasses the Expression sandbox mechanism and achieve remote code execution on the main n8n node.

The second flaw, CVE-2026-0863, is an eval injection against the python-task-executor sandbox with a CVSS score of 8.5. This vulnerability can let an authenticated user run arbitrary Python on the underlying operating system.

“As n8n spans an entire organization to automate AI workflows, it holds the keys to core tools, functions, and data from infrastructure, including LLM APIs, sales data, and internal IAM systems, among others,” JFrog wrote in its disclosure. The vendor warned that sandbox escapes can effectively give an attacker broad access.

Patches are available; affected users are advised to upgrade to the fixed releases. For CVE-2026-1470 install 1.123.17, 2.4.5, or 2.5.1. For CVE-2026-0863 install 1.123.14, 2.3.5, or 2.4.2.

- Advertisement -

“These vulnerabilities highlight how difficult it is to safely sandbox dynamic, high‑level languages such as JavaScript and Python,” said researcher Nathan Nehorai. “In this case, deprecated or rarely used constructs, combined with interpreter changes and exception handling behavior, were enough to break out of otherwise restrictive sandboxes and achieve remote code execution.”

The disclosure follows another maximum-severity n8n flaw (CVE-2026-21858, “Ni8mare”) reported weeks earlier. Users should review task-runner configuration and apply updates promptly; n8n documentation recommends using external execution mode for production.

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Hong Kong CEO Touts City as Web3 Hub, Stablecoin Licenses Soon

Hong Kong's Chief Executive, John KC Lee, has declared the city's goal to become...

Ray Dalio Warns of Government Control via CBDCs

Ray Dalio warns CBDCs grant governments sweeping transaction monitoring and policy enforcement powers.He argues...

LSEG, Apex Group to tokenize private funds by 2026

First paragraph: A compelling hook combining who, what, when, where.LSEG and Apex Group launch...

Justin Sun’s Ex Says X Account Suspended Over Mass Reports

An X account belonging to Justin Sun's alleged former girlfriend, Zeng Ying, was suspended...

Dollar Could Fall 10% on Aggressive Fed Cuts

State Street strategists warn the US dollar could fall up to 10% if the...

Must Read

8 Best Bitcoin Offshore Hosting Providers

In this blog post, we'll list the top 8 best bitcoin offshore hosting providers that accept Bitcoin and other cryptocurrencies.As Bitcoin continues to grow...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!