Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Critical and High Severity n8n Sandbox Flaws Allow RCE
Cyber Security

Critical and High Severity n8n Sandbox Flaws Allow RCE

Team-CWDBy Team-CWDJanuary 28, 2026No Comments2 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Two serious security flaws affecting the n8n workflow automation platform have exposed weaknesses in the product’s sandboxing mechanisms for JavaScript and Python code.

The vulnerabilities, disclosed by the JFrog Security Research team, could allow authenticated attackers to run arbitrary commands on systems hosting vulnerable n8n instances, including the company’s cloud service and self-hosted deployments that have not been patched.

n8n is a widely adopted automation platform that blends AI-driven capabilities with business process orchestration. Because workflows often require custom scripting, the platform relies on sandbox controls designed to prevent user-supplied code from accessing the underlying operating system. According to the researchers, those controls can be bypassed despite recent security improvements.

The first flaw, tracked as CVE-2026-1470 and rated a CVSS 3.1 score of 9.9 Critical, affects n8n’s JavaScript expression engine. The second, CVE-2026-0863, is rated 8.5 High and impacts Python execution in the Code node when running in “Internal” mode.

In both cases, the researchers demonstrated that gaps in abstract syntax tree validation could be abused to escape the sandbox and achieve full remote code execution (RCE).

Exploitation requires the ability to create or modify workflows, a capability often granted to legitimate users. Once abused, the vulnerabilities allow attackers to execute commands in the context of the main n8n service, potentially exposing environment variables, sensitive data and system-level access.

Read more on workflow automation security: Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers

In the JavaScript issue, the researchers found that the sandbox logic did not adequately handle a deprecated yet still-supported language feature: the with statement.

By manipulating how identifiers were resolved, they were able to indirectly access the Function constructor and execute arbitrary code. The vulnerability was considered particularly severe because the code ran directly within n8n’s primary process.

The Python flaw stemmed from a different class of weakness. While n8n uses a highly restrictive policy that blocks imports and many built-in functions, the researchers showed that Python’s string formatting and changes introduced in Python 3.10 could be combined to recover restricted objects through exception handling. This made it possible to bypass the sandbox even without direct access to forbidden functions.

n8n users are advised to upgrade as soon as possible. CVE-2026-1470 is fixed in versions 1.123.17, 2.4.5 and 2.5.1, while CVE-2026-0863 is addressed in versions 1.123.14, 2.3.5 and 2.4.2. All earlier versions remain vulnerable.

Image credit: Stock all / Shutterstock.com



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleAutonomous System Uncovers Long-Standing OpenSSL Flaws
Next Article SmarterMail Auth Bypass Exploited in the Wild Two Days After Patch Release
Team-CWD
  • Website

Related Posts

Cyber Security

Why AI’s Rise Makes Protecting Personal Data More Critical Than Ever

February 6, 2026
Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

February 4, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Why the tech industry needs to stand firm on preserving end-to-end encryption

September 12, 2025

What parents should know to protect their children from doxxing

November 28, 2025

How to help older family members avoid scams

October 31, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.