Close Menu
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
What's Hot

Orchid Security brings continuous identity observability to enterprise applications

LanzaTech aims for Humberside as sustainable aviation fuel facility

How early decisions shape incident response investigations

Facebook X (Twitter) Instagram
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
Facebook X (Twitter) Instagram
Fyself News
  • Home
  • Identity
  • Inventions
  • Future
  • Science
  • Startups
  • Spanish
Fyself News
Home » Two high-severity flaws in n8n allow authenticated remote code execution
Identity

Two high-severity flaws in n8n allow authenticated remote code execution

userBy userJanuary 28, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest Telegram LinkedIn Tumblr Email Copy Link
Follow Us
Google News Flipboard
Share
Facebook Twitter LinkedIn Pinterest Email Copy Link

Ravi LakshmananJanuary 28, 2026Vulnerability/Workflow Automation

Cybersecurity researchers have uncovered two new security flaws in the n8n workflow automation platform, including a critical vulnerability that could allow remote code execution.

The vulnerabilities discovered by the JFrog Security Research team are as follows:

CVE-2026-1470 (CVSS Score: 9.9) – eval injection vulnerability that allows an authenticated user to bypass the Expression sandbox mechanism and achieve full remote code execution on n8n’s main node by passing specially crafted JavaScript code CVE-2026-0863 (CVSS Score: 8.5) – An authenticated user may be able to bypass the Expression sandbox mechanism and achieve full remote code execution on the main node of n8n eval injection vulnerability that could potentially bypass mechanisms in the python-task-executor sandbox and execute arbitrary Python code on the underlying operating system

Successful exploitation of this flaw could allow an attacker to hijack an entire n8n instance, including scenarios running in “internal” execution mode. n8n states in its documentation that using internal mode in production environments can pose a security risk, and urges users to switch to external mode to ensure proper isolation between n8n and the task runner process.

cyber security

“n8n unlocks core tools, capabilities, and data from infrastructure including LLM APIs, sales data, internal IAM systems, and more to automate AI workflows across the organization,” JFrog said in a statement shared with The Hacker News. “As a result, you are denying hackers a valid ‘skeleton key’ to your entire enterprise. ”

To address this flaw, users are advised to update to the following versions:

CVE-2026-1470 – 1.123.17, 2.4.5, or 2.5.1 CVE-2026-0863 – 1.123.14, 2.3.5, or 2.4.2

This development comes just weeks after Cyera Research Labs detailed a maximum severity security flaw in n8n (CVE-2026-21858 aka Ni8mare) that allows an unauthenticated, remote attacker to gain complete control of a vulnerable instance.

“These vulnerabilities highlight how difficult it is to securely sandbox dynamic high-level languages ​​such as JavaScript and Python,” said researcher Nathan Nehorai. “Even when multiple validation layers, deny lists, and AST-based controls are in place, subtle language features and runtime behaviors can be leveraged to circumvent security assumptions.”

“In this case, deprecated or rarely used constructs, combined with changes to the interpreter and exception handling behavior, were sufficient to break through the restrictive sandbox and execute code remotely.”


Source link

#BlockchainIdentity #Cybersecurity #DataProtection #DigitalEthics #DigitalIdentity #Privacy
Follow on Google News Follow on Flipboard
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email Copy Link
Previous ArticleFrom triage to threat hunting: how AI accelerates SecOps
Next Article Scientists say ‘dangerous’ lithium-ion batteries will be out of use for days after breakthrough in fast-charging sodium-ion replacement
user
  • Website

Related Posts

Orchid Security brings continuous identity observability to enterprise applications

February 4, 2026

How early decisions shape incident response investigations

February 4, 2026

Microsoft warns that Python Infostears is targeting macOS via fake ads and installers

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest Posts

Orchid Security brings continuous identity observability to enterprise applications

LanzaTech aims for Humberside as sustainable aviation fuel facility

How early decisions shape incident response investigations

EU’s Destination Earth project enters phase 3

Trending Posts

Subscribe to News

Subscribe to our newsletter and never miss our latest news

Please enable JavaScript in your browser to complete this form.
Loading

Welcome to Fyself News, your go-to platform for the latest in tech, startups, inventions, sustainability, and fintech! We are a passionate team of enthusiasts committed to bringing you timely, insightful, and accurate information on the most pressing developments across these industries. Whether you’re an entrepreneur, investor, or just someone curious about the future of technology and innovation, Fyself News has something for you.

Castilla-La Mancha Ignites Innovation: fiveclmsummit Redefines Tech Future

Local Power, Health Innovation: Alcolea de Calatrava Boosts FiveCLM PoC with Community Engagement

The Future of Digital Twins in Healthcare: From Virtual Replicas to Personalized Medical Models

Human Digital Twins: The Next Tech Frontier Set to Transform Healthcare and Beyond

Facebook X (Twitter) Instagram Pinterest YouTube
  • Home
  • About Us
  • Advertise with Us
  • Contact Us
  • DMCA
  • Privacy Policy
  • Terms & Conditions
  • User-Submitted Posts
© 2026 news.fyself. Designed by by fyself.

Type above and press Enter to search. Press Esc to cancel.