Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

Phishing attacks exploit misconfigured emails to target Microsoft 365

January 8, 2026

Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act

January 8, 2026

Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers

January 8, 2026
Facebook X (Twitter) Instagram
Thursday, January 8
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»News»Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers
News

Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers

Team-CWDBy Team-CWDJanuary 8, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Security experts have warned of a critical new vulnerability in popular AI workflow automation platform n8n that could enable adversaries to take over locally deployed instances and compromise enterprise secrets.

Cyera revealed the “Ni8mare” vulnerability (CVE-2026-21858) in a blog post yesterday. It has a CVSS score of 10.0, reflecting the fact that remote, unauthenticated hackers can exploit the bug with potentially severe consequences.

The n8n platform has over 100 million Docker pulls and millions of users, with 100,000 servers potentially exposed, Cyera said.

However, because it plays such an important role in enterprise automation efforts – connecting to Google Drive, Salesforce, OpenAI, CI/CD pipelines, payment processors and more – the blast radius of a compromised server could be “massive,” the vendor warned.

“Imagine a large enterprise with 10,000+ employees with one n8n server that anyone uses. A compromised n8n instance doesn’t just mean losing one system – it means handing attackers the keys to everything,” Cyera explained.

“API credentials, OAuth tokens, database connections, cloud storage – all centralized in one place. N8n becomes a single point of failure and a goldmine for threat actors.”

Read more on maximum severity bugs: Ransomware Warning as CVSS 10.0 ScreenConnect Bug is Exploited

There are no official workarounds available for Ni8mare, with users urged to upgrade to version 1.121.0 or later to remediate.

According to the official advisory, the vulnerability enables threat actors to access files on an affected server through execution of certain form-based workflows.

“A vulnerable workflow could grant access to an unauthenticated remote attacker, resulting in exposure of sensitive information stored on the system and may enable further compromise depending on deployment configuration and workflow usage,” it noted.

How it Works

The vulnerability relates to the webhooks that start workflows in n8n. The platform parses incoming data based on the “content-type” header in a webhook.

When a request is “multipart/form-data” the platform uses a special file upload parser (Formidable) which stores the files in temporary locations. It does this to protect against path traversal attacks. However, for all other content types, a regular parser is used.

“Here’s what matters: the file upload parser wraps Formidable’s parse() function,” explained Cyera.

“Unlike the regular body parser that populates req.body, this one populates req.body.files with the output from Formidable.”

If a threat actor were to change the content type to something like application/json, the n8n middleware would call the regular parser instead of the special file upload parser. This means req.body.files wouldn’t be populated.

Thus, n8n would process file-related fields without verifying that the request contains a valid file upload, meaning an attacker could control the file metadata and file path.

“Here’s the issue: since this function is called without verifying the content type is multipart/form-data, we control the entire req.body.files object. That means we control the filepath parameter  – so instead of copying an uploaded file, we can copy any local file from the system,” Cyera explained.

“The result? Any node after the Form node receives the local file’s content instead of what the user uploaded.”

The vulnerability can therefore be used to read arbitrary files from an n8n instance, and in turn expose secrets, inject files into workflows, forge session cookies for authentication bypass and achieve arbitrary code execution, the report warned.

Cyera thanked the security team at n8n for its prompt response in patching the flaw, which was reported on November 9 and fixed nine days later.



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleNew VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code
Next Article Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act
Team-CWD
  • Website

Related Posts

News

Phishing attacks exploit misconfigured emails to target Microsoft 365

January 8, 2026
News

Bitfinex Hack Convict Ilya Lichtenstein Released Early Under U.S. First Step Act

January 8, 2026
News

New VVS Stealer Malware Targets Discord Accounts via Obfuscated Python Code

January 8, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202521 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

In memoriam: David Harley

November 12, 2025

Find your weak spots before attackers do

November 21, 2025

What are brushing scams and how do I stay safe?

December 24, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.