Close Menu
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice

Subscribe to Updates

Get the latest creative news from FooBar about art, design and business.

What's Hot

New RCEs, Darknet Busts, Kernel Bugs & 25+ More Stories

February 6, 2026

Survey of 100+ Energy Systems Reveals Critical OT Cybersecurity Gaps

February 6, 2026

SolarWinds Web Help Desk Vulnerability Actively Exploited

February 6, 2026
Facebook X (Twitter) Instagram
Friday, February 6
Facebook X (Twitter) Instagram Pinterest Vimeo
Cyberwire Daily
  • Home
  • News
  • Cyber Security
  • Internet of Things
  • Tips and Advice
Cyberwire Daily
Home»Cyber Security»Two Critical Flaws Found in n8n AI Workflow Automation Platform
Cyber Security

Two Critical Flaws Found in n8n AI Workflow Automation Platform

Team-CWDBy Team-CWDFebruary 4, 2026No Comments3 Mins Read
Share Facebook Twitter Pinterest LinkedIn Tumblr Reddit Telegram Email
Share
Facebook Twitter LinkedIn Pinterest Email


Researchers at Pillar Security have found two maximum severity vulnerabilities (CVSS score of 10.0) in n8n, a popular open-source workflow automation platform powering hundreds of thousands of enterprise AI systems worldwide.

The flaws are sandbox escape vulnerabilities which, when exploited, allow any authenticated user to achieve complete server control and steal any stored credential, including API keys, cloud provider keys, database passwords and OAuth tokens on both self-hosted and cloud n8n instances.

The first flaw was reported by Pillar Security to n8n maintainers, who released a patch, but a second vulnerability bypassing the fix was discovered 24 hours after initial patch was deployed.

N8n released a new patched version, version 2.4.0, with fixes for both vulnerabilities, in January 2026.

While the Pillar Security advisory addressing both flaws has a GitHub vulnerability identifier, GHSA-6cqr-8cfr-67f8, the firm did not reveal the CVE identifier for either of the vulnerabilities.

The Pillar Security researchers noted that companies using n8n for AI orchestration face credential exposure when using OpenAI, Anthropic, Azure OpenAI and Hugging Face as well as vector database access (e.g. Pinecone, Weaviate, Qdrant).

Attack Scenarios Explained

Attackers who successfully exploit either of these flaws can intercept AI prompts, modify AI responses, redirect traffic through attacker-controlled endpoints and exfiltrate sensitive data from AI interactions.

Additionally, on n8n cloud, a single compromised user could potentially access shared infrastructure and other customers’ data within the Kubernetes cluster.

In a press release sent to Infosecurity on February 4, Eilon Cohen, an AI security researcher at Pillar Security, said what stands out in these vulnerabilities is “the combination of ease of exploitation and the high value targets they expose.”

“If you can create a workflow in n8n, you can own the server. For attackers, this means access to OpenAI keys, Anthropic credentials, AWS accounts and the ability to intercept or modify AI interactions in real-time – all while the workflows continue functioning normally,” he added.

Mitigation Recommendations

Pillar Security recommended implementing the following immediate actions to mitigate the threat posed by these vulnerabilities:

  1. Upgrade Immediately: Update to n8n version 2.4.0 or later
  2. Rotate encryption key: If running an affected version, rotate n8n encryption key
  3. Rotate all credentials: Assume stored credentials may have been compromised and rotate them
  4. Audit workflows: Review workflow execution logs for suspicious expressions or unexpected behavior
  5. Monitor AI workflows: Watch for unusual patterns like base URL changes, new outbound connections, or modified prompts

Image credits: Azulblue / Shutterstock

Read now: Maximum Severity “Ni8mare” Bug Lets Hackers Hijack n8n Servers



Source

Share. Facebook Twitter Pinterest LinkedIn Tumblr Email
Previous ArticleGlobal SystemBC Botnet Found Active Across 10,000 Infected Systems
Next Article Russia-Aligned ELECTRUM Tied to December 2025 Cyber Attack on Polish Power Grid
Team-CWD
  • Website

Related Posts

Cyber Security

New Hacking Campaign Exploits Microsoft Windows WinRAR Vulnerability

February 5, 2026
Cyber Security

Sophos CISO on Software Flaws, Vendor Risk and Secure by Design

February 4, 2026
Cyber Security

SQL Injection Flaw Affects 40,000 WordPress Sites

February 3, 2026
Add A Comment
Leave A Reply Cancel Reply

Latest News

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views

U.S. Treasury Sanctions DPRK IT-Worker Scheme, Exposing $600K Crypto Transfers and $1M+ Profits

September 5, 20256 Views

Ukrainian Ransomware Fugitive Added to Europe’s Most Wanted

September 11, 20255 Views
Stay In Touch
  • Facebook
  • YouTube
  • TikTok
  • WhatsApp
  • Twitter
  • Instagram
Most Popular

North Korean Hackers Turn JSON Services into Covert Malware Delivery Channels

November 24, 202522 Views

macOS Stealer Campaign Uses “Cracked” App Lures to Bypass Apple Securi

September 7, 202517 Views

North Korean Hackers Exploit Threat Intel Platforms For Phishing

September 7, 20256 Views
Our Picks

Drowning in spam or scam emails lately? Here’s why

January 27, 2026

Children and chatbots: What parents should know

January 23, 2026

The WhatsApp screen-sharing scam you didn’t see coming

November 6, 2025

Subscribe to Updates

Get the latest news from cyberwiredaily.com

Facebook X (Twitter) Instagram Pinterest
  • Home
  • Contact
  • Privacy Policy
  • Terms of Use
  • California Consumer Privacy Act (CCPA)
© 2026 All rights reserved.

Type above and press Enter to search. Press Esc to cancel.